Author of the publication

An improvement of both security and reliability for elliptic curve scalar multiplication Montgomery algorithm.

, , , , and . Multim. Tools Appl., 82 (8): 11973-11992 (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Countermeasure-Based Fault-Resistant AES Implementation., , , and . J. Circuits Syst. Comput., 29 (3): 2050044:1-2050044:17 (2020)Novel ECC-Based RFID Mutual Authentication Protocol for Emerging IoT Applications., , , , , and . IEEE Access, (2021)Improved TiO2 TEAM Model Using a New Window Function., , and . ICM, page 236-239. IEEE, (2018)Neural-Network Based Modeling of I/O Buffer Predriver under Power/Ground Supply Voltage Variations., , , , , and . Sensors, 21 (18): 6074 (2021)An improvement of both security and reliability for elliptic curve scalar multiplication Montgomery algorithm., , , , and . Multim. Tools Appl., 82 (8): 11973-11992 (March 2023)An improvement of both security and reliability for AES implementations., , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part B): 9844-9851 (November 2022)Design for testability in nano-CMOS analog integrated circuits using a new design analog checker., , , and . ISOCC, page 317-320. IEEE, (2011)Investigation on the Effectiveness of Current Supply Testing Methods in CMOS Operational Amplifiers., , and . SSD, page 1041-1044. IEEE, (2018)TiO2 memristor model-based chaotic oscillator., , and . ICECS, page 54-57. IEEE, (2017)The DFA/DFT-based hacking techniques and countermeasures: Case study of the 32-bit AES encryption crypto-core., , , and . IET Comput. Digit. Tech., 15 (2): 160-170 (2021)