Author of the publication

Low-Complexity and Reliable Transforms for Physical Unclonable Functions.

, and . ICASSP, page 2807-2811. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Artificial Noise-Aided Physical Layer Security in Underlay Cognitive Massive MIMO Systems with Pilot Contamination., , and . Entropy, 19 (7): 349 (2017)The Deterministic and Correlated Random Public-Confidential Capacity Regions of the Arbitrarily Varying Wiretap Channel., , and . WIFS, page 1-7. IEEE, (2018)Real Number Signal Processing can Detect Denial-of-Service Attacks., , and . ICASSP, page 4765-4769. IEEE, (2021)Secure Joint Communication and Sensing., , , and . ISIT, page 844-849. IEEE, (2022)Capacity of Finite State Channels with Feedback: Algorithmic and Optimization Theoretic Properties., , , and . ISIT, page 498-503. IEEE, (2022)A Reverse Jensen Inequality Result with Application to Mutual Information Estimation., , , and . ITW, page 1-6. IEEE, (2021)Secure Lossy Function Computation with Multiple Private Remote Source Observations., , and . WSA, page 1-6. VDE Berlag / IEEE, (2021)Randomized Nested Polar Subcode Constructions for Privacy, Secrecy, and Storage., , , , and . ISITA, page 475-479. IEEE, (2020)Multiple Noisy Private Remote Source Observations for Secure Function Computation., , and . ACSCC, page 690-697. IEEE, (2021)Stealthy keyless secret key generation from degraded sources., , , and . ACSSC, page 14-18. IEEE, (2017)