Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function., , , , and . SECRYPT, page 270-275. SciTePress, (2012)A template-based methodology for efficient microprocessor and FPGA accelerator co-design., , , , and . ICSAMOS, page 15-22. IEEE, (2012)Designs and comparisons of authentication modules for IPSec in configurable and extensible embedded processor., , , and . ICECS, page 243-246. IEEE, (2010)A data locality methodology for matrix-matrix multiplication algorithm., , , , , and . J. Supercomput., 59 (2): 830-851 (2012)Area-Throughput Trade-Offs for SHA-1 and SHA-256 Hash Functions' Pipelined Designs., , , , , and . Journal of Circuits, Systems, and Computers, 25 (4): 1650032:1-1650032:26 (2016)A Methodology for Speeding Up Fast Fourier Transform Focusing on Memory Architecture Utilization., , , , , and . IEEE Trans. Signal Process., 59 (12): 6217-6226 (2011)Green footprint of Cognitive Management Technologies for Future Networks., , , and . MIPRO, page 645-649. IEEE, (2011)Cooperative management of wireless mesh networks.. Wireless Days, page 1-6. IEEE, (2012)Green Traffic Engineering for future core networks., and . SoftCOM, page 1-4. IEEE, (2012)A Wireless Sensor Network Testbed for Event Detection in Smart Homes., , and . DCOSS, page 321-322. IEEE Computer Society, (2013)