From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation., , , , , , и . COSADE, том 7275 из Lecture Notes in Computer Science, стр. 231-248. Springer, (2012)Secure Over-The-Air Firmware Updates for Sensor Networks., , , , , , и . MASS Workshops, стр. 97-100. IEEE, (2019)Accelerating higher-order masking of AES using composite field and SIMD., , , и . ISSPIT, стр. 575-580. IEEE Computer Society, (2015)SDRT: A reliable data transport protocol for underwater sensor networks., , , , и . Ad Hoc Networks, 8 (7): 708-722 (2010)Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks., , , , и . WASA, том 5682 из Lecture Notes in Computer Science, стр. 305-314. Springer, (2009)On Permutation Operations in Cipher Design., , , , и . ITCC (2), стр. 569-577. IEEE Computer Society, (2004)isbn: 0-7695-2108-8.Physics-aware Roughness Optimization for Diffractive Optical Neural Networks., , , , , , и . DAC, стр. 1-6. IEEE, (2023)Subword Sorting with Versatile Permutation Instructions., и . ICCD, стр. 234-241. IEEE Computer Society, (2002)Arbitrary Bit Permutations in One or Two Cycles., , и . ASAP, стр. 237-. IEEE Computer Society, (2003)Validating Word-Oriented Processors for Bit and Multi-word Operations., , и . Asia-Pacific Computer Systems Architecture Conference, том 3189 из Lecture Notes in Computer Science, стр. 473-488. Springer, (2004)