Author of the publication

Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions.

, and . Comput. Secur., 28 (3-4): 229-241 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PWLCM Based Secure Measurement Matrix Generation for Secure Video Compressive Sensing., , and . SSCC, volume 467 of Communications in Computer and Information Science, page 182-191. Springer, (2014)Low Complex System for Physical Layer Security Using NLFG and QCLDPC Code., and . SSCC, volume 467 of Communications in Computer and Information Science, page 313-324. Springer, (2014)Optimized hardware design and implementation of EC based key management scheme for WSN., , and . ICITST, page 164-169. IEEE, (2015)Collusion resistant secret sharing scheme for secure data storage and processing over cloud., , and . J. Inf. Secur. Appl., (2021)Index Coding in Vehicle to Vehicle Communication., , , and . IEEE Trans. Veh. Technol., 69 (10): 11926-11936 (2020)Index Coded - NOMA in Vehicular Ad Hoc Networks., , , , and . IEEE Trans. Veh. Technol., 71 (9): 10073-10087 (2022)Light Weight Key Establishment Scheme for Wireless Sensor Networks., and . SPACE, volume 10076 of Lecture Notes in Computer Science, page 124-137. Springer, (2016)User Clustering and Optimum Bandwidth Allocation for Down link Multi-Carrier NOMA., , , and . TENCON, page 702-707. IEEE, (2023)User grouping and resource management in efficient NOMA-OMA transmission scheme for infotainment message dissemination in VANETs., , and . Trans. Emerg. Telecommun. Technol., (October 2023)Secure Integer Comparison Protocol For ML-based Disease Diagnosis In MHN With Energy Efficient Edge Computing., , and . CISS, page 1-6. IEEE, (2022)