Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating Accelerators for a High-Throughput Hash-Based Security Protocol., , , , , and . ICPP Workshops, page 40-49. ACM, (2023)Design and Analysis of Pre-formed ReRAM-Based PUF., , , , , and . SAI (3), volume 508 of Lecture Notes in Networks and Systems, page 532-549. Springer, (2022)A Secret Key Generation Scheme for Internet of Things using Ternary-States ReRAM-based Physical Unclonable Functions., , and . IWCMC, page 1261-1266. IEEE, (2018)A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices., , , and . SECON, page 1-8. IEEE, (2019)Multi-Wavelength Quantum Key Distribution Emulation with Physical Unclonable Function., , , , , , and . Cryptogr., 6 (3): 36 (2022)Tamper Sensitive Ternary ReRAM-Based PUFs., and . SAI (3), volume 285 of Lecture Notes in Networks and Systems, page 1020-1040. Springer, (2021)Hash Based Encryption Schemes Using Physically Unclonable Functions., , , and . SAI (3), volume 508 of Lecture Notes in Networks and Systems, page 602-616. Springer, (2022)Bit Error Rate Analysis of Pre-formed ReRAM-based PUF., , , and . SAI (3), volume 508 of Lecture Notes in Networks and Systems, page 882-901. Springer, (2022)Dynamic Key Generation for Polymorphic Encryption., , , and . CCWC, page 482-487. IEEE, (2019)Adapting processor architectures for the periphery of the IoT nervous system., and . WF-IoT, page 615-620. IEEE Computer Society, (2016)