Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of traceable security system., , and . Appl. Math. Comput., 168 (2): 933-944 (2005)Low-Complexity Bit-Parallel Systolic Multipliers over GF(2m)., , , and . SMC, page 1160-1165. IEEE, (2006)New bit-parallel systolic multipliers for a class of GF(2m)., , and . ISCAS (4), page 578-581. IEEE, (2001)Word-Based AES Encryption Without Data Expansion., , and . J. Inf. Sci. Eng., 32 (4): 849-861 (2016)Improvement of turbo decoding using cross-entropy., , and . Comput. Commun., 32 (6): 1034-1038 (2009)Low-Complexity Bit-Parallel Systolic Montgomery Multipliers for Special Classes of GF(2m)., , , and . IEEE Trans. Computers, 54 (9): 1061-1070 (2005)A conference key distribution system based on the Lagrange interpolating polynomial., , , and . INFOCOM, page 1092-1094. IEEE, (1988)Combined circuit architecture for computing normal basis and montgomery multiplications over GF(2m)., , and . Mobility Conference, page 46. ACM, (2008)A Mobile RFID-based Mutual Authentication Protocol using Elliptic Curve Cryptography for Security Patrolling Application., , , and . RFIDSec Asia, volume 8 of Cryptology and Information Security Series, page 63-71. IOS Press, (2012)A New Method for Evaluating Error Magnitudes of Reed-Solomon Codes., , and . IEEE Communications Letters, 18 (2): 340-343 (2014)