Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Throughput Optimization of the Cipher Message Authentication Code., , , and . DSP, page 495-498. IEEE, (2007)Prototype Haptic Feedback Device for Robot-Assisted Minimally Invasive Surgery., and . SEEDA-CECNSM, page 1-6. IEEE, (2021)An RNS Implementation of an Fp Elliptic Curve Point Multiplier., , , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 56-I (6): 1202-1213 (2009)Implementation of HSSec: a high-speed cryptographic co-processor., , , and . ETFA, page 625-631. IEEE, (2007)Low-power architecture with scratch-pad memory for accelerating embedded applications with run-time reuse., , , , , , and . IET Comput. Digit. Tech., 3 (1): 109-123 (2009)A Low Power Design for Sbox Cryptographic Primitive of Advanced Encryption Standard for Mobile End-Users., , , , and . J. Low Power Electron., 3 (3): 327-336 (2007)A low power fault secure timer implementation based on the Gray encoding scheme., , , and . ICECS, page 537-540. IEEE, (2002)Temporal and System Level Modifications for High Speed VLSI Implementations of Cryptographic Core., , , , , and . ICECS, page 1180-1183. IEEE, (2006)Design of low-power on-line reconfigurable datapaths using self-checking circuits., , and . ICECS, page 1565-1568. IEEE, (2001)Cipher Block Based Authentication Module: a Hardware Design Perspective., , , , and . J. Circuits Syst. Comput., 20 (2): 163-184 (2011)