Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IP watermark verification based on power consumption analysis., , and . SoCC, page 330-335. IEEE, (2014)On the security evaluation of the ARM TrustZone extension in a heterogeneous SoC., , , and . SoCC, page 108-113. IEEE, (2017)Low-level implementation and side-channel detection of stealthy hardware trojans on field programmable gate arrays., and . IET Comput. Digit. Tech., 8 (6): 246-255 (2014)The Best, The Requested, and The Default Non-Binary LDPC Decoding Algorithm., , and . ISTC, page 1-5. IEEE, (2021)FVLLMONTI: The 3D Neural Network Compute Cube $(N^2C^2)$ Concept for Efficient Transformer Architectures Towards Speech-to-Speech Translation., , , , , , , , , and 25 other author(s). DATE, page 1-6. IEEE, (2024)Non Volatile Operators Emulation Platform., , and . NANOARCH, page 15:1-15:6. ACM, (2023)FeFET based Logic-in-Memory design methodologies, tools and open challenges., , , , , and . VLSI-SoC, page 1-6. IEEE, (2023)NB-LDPC check node with pre-sorted input., and . ISTC, page 196-200. IEEE, (2016)Conflict Resolution by Matrix Reordering for DVB-T2 LDPC Decoders., , , and . GLOBECOM, page 1-6. IEEE, (2009)Conflict resolution for pipelined layered LDPC decoders., , , and . SiPS, page 220-225. IEEE, (2009)