Author of the publication

Godson-T: An Efficient Many-Core Architecture for Parallel Program Executions.

, , , , , , , , , , , and . J. Comput. Sci. Technol., 24 (6): 1061-1073 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Template Attacks Based on Priori Knowledge., , , and . INTRUST, volume 9473 of Lecture Notes in Computer Science, page 346-363. Springer, (2014)Public-key encryption with keyword search secure against continual memory attacks., , , , , and . Secur. Commun. Networks, 9 (11): 1613-1629 (2016)Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes., , , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Optimizing Higher-Order Correlation Analysis Against Inner Product Masking Scheme., , , and . IEEE Trans. Inf. Forensics Secur., (2022)Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond., , and . IACR Cryptol. ePrint Arch., (2023)The Notion of Transparency Order, Revisited., , , , and . Comput. J., 63 (12): 1915-1938 (2020)A secure and highly efficient first-order masking scheme for AES linear operations., , , and . Cybersecur., 4 (1): 14 (2021)Analysis of GEO intersatellite laser time transfer and link performance., , , , , and . EMEIT, page 1814-1817. IEEE, (2011)A Review: Machine Tools Digital Twin Modeling And Application., , , and . ICAC, page 1-6. IEEE, (2021)Table Re-Computation Based Low Entropy Inner Product Masking Scheme., , , and . DATE, page 1-6. IEEE, (2023)