Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Diagnosis of Schizophrenia using EEG Signals and CNN-LSTM Models., , , , , , , , , and . CoRR, (2021)Local and Global Feature Utilization for Breast Image Classification by Convolutional Neural Network., and . DICTA, page 1-6. IEEE, (2017)Secret Key Classification Based on Electromagnetic Analysis and Feature Extraction Using Machine-Learning Approach., and . FNSS, volume 878 of Communications in Computer and Information Science, page 80-92. Springer, (2018)Revisiting Sum of Residues Modular Multiplication., and . J. Electr. Comput. Eng., (2010)High-throughput multi-key elliptic curve cryptosystem based on residue number system., , and . IET Comput. Digit. Tech., 11 (5): 165-172 (2017)High-performance elliptic curve cryptography processor over NIST prime fields., , , and . IET Comput. Digit. Tech., 11 (1): 33-42 (2017)Performance Analysis of Integrated Canny and Fuzzy-Logic Based (2-by-2 Cell Block) Edge-Detection Algorithms., , and . EMS, page 64-69. IEEE, (2016)Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering., , , , and . COSADE, volume 13211 of Lecture Notes in Computer Science, page 3-28. Springer, (2022)FPGA-based efficient modular multiplication for Elliptic Curve Cryptography., and . ITNAC, page 191-195. IEEE Computer Society, (2015)Highly parallel modular multiplication in the residue number system using sum of residues reduction., , and . Appl. Algebra Eng. Commun. Comput., 21 (3): 249-255 (2010)