Author of the publication

A Reconfigurable Implementation of the New Secure Hash Algorithm.

, , , , and . ARES, page 281-285. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An AOP-Based Fault Injection Environment for Cryptographic SystemC Designs., , , and . J. Circuits Syst. Comput., 24 (1): 1550008:1-1550008:22 (2015)The DFA/DFT-based hacking techniques and countermeasures: Case study of the 32-bit AES encryption crypto-core., , , and . IET Comput. Digit. Tech., 15 (2): 160-170 (2021)A novel holographic technique for RFID localization in indoor environments., , and . Multim. Tools Appl., 83 (10): 29827-29840 (March 2024)CT-Scans Images Segmentation for COVID-19 Detection Based CNN Models., and . ICCAD, page 1-7. IEEE, (2021)Design and SystemC Implementation of Chaos-Based Enhancements for the Advanced Encryption Standard., , and . ICCTA, page 50-56. IEEE, (2017)Hash Key-Based Image Cryptosystem Using Chaotic Maps and Cellular Automata., , , and . SSD, page 190-194. IEEE, (2018)Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256., , , and . SSD, page 1-5. IEEE, (2015)Performance trade-offs of hybrid cryptosystem for medical images encryption - decryption., , and . SSD, page 1221-1229. IEEE, (2021)Efficient software implementation of the final exponentiation for pairing., , , and . IPAS, page 1-4. IEEE, (2016)Simulation-based verification of large-integer arithmetic circuits., , , and . IVSW, page 1-6. IEEE, (2016)