From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Comparative Study of Authenticated Encryption Targeting Lightweight IoT Applications., и . IEEE Des. Test, 34 (4): 26-33 (2017)Incremental-Precision Based Feature Computation and Multi-Level Classification for Low-Energy Internet-of-Things., и . IEEE J. Emerg. Sel. Topics Circuits Syst., 8 (4): 822-835 (2018)Functional encryption of integrated circuits by key-based hybrid obfuscation., , и . ACSSC, стр. 484-488. IEEE, (2017)Key-Based Dynamic Functional Obfuscation of Integrated Circuits Using Sequentially Triggered Mode-Based Design., , и . IEEE Trans. Inf. Forensics Secur., 13 (1): 79-93 (2018)Probabilistic Hardware Trojan Attacks on Multiple Layers of Reconfigurable Network Infrastructure., , , , , и . J. Hardw. Syst. Secur., 4 (4): 343-360 (2020)AccShield: a New Trusted Execution Environment with Machine-Learning Accelerators., , , , , и . DAC, стр. 1-6. IEEE, (2023)Security Risk Assessment of Server Hardware Architectures Using Graph Analysis.. AsianHOST, стр. 1-4. IEEE, (2021)Low-Energy Architectures of Linear Classifiers for IoT Applications using Incremental Precision and Multi-Level Classification., и . ACM Great Lakes Symposium on VLSI, стр. 291-296. ACM, (2018)Performance Optimization of Lattice Post-Quantum Cryptographic Algorithms on Many-Core Processors., , и . ISPASS, стр. 223-225. IEEE, (2020)Analysis and Hardware Optimization of Lattice Post-Quantum Cryptography Workloads., , и . HASP@MICRO, стр. 2:1-2:9. ACM, (2020)