Author of the publication

Security Enhancement for IoT Device using Physical Unclonable Functions.

, , , and . ICTC, page 1457-1459. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Function Masking: A New Countermeasure Against Side Channel Attack., , , and . WISA, volume 8909 of Lecture Notes in Computer Science, page 331-342. Springer, (2014)Wireless Transceiver Aided Run-Time Secret Key Extraction for IoT Device Security., , , and . IEEE Trans. Consumer Electronics, 66 (1): 11-21 (2020)Security Enhancement for IoT Device using Physical Unclonable Functions., , , and . ICTC, page 1457-1459. IEEE, (2019)Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (1): 153-163 (2010)Protecting secret keys in networked devices with table encoding against power analysis attacks., , , and . J. High Speed Networks, 22 (4): 293-307 (2016)T-depth reduction method for efficient SHA-256 quantum circuit construction., , , and . IET Inf. Secur., 17 (1): 46-65 (January 2023)Rapid Run-Time DRAM PUF Based on Bit-Flip Position for Secure IoT Devices., , , and . IEEE SENSORS, page 1-4. IEEE, (2018)New efficient batch verification for an identity-based signature scheme., , , and . Secur. Commun. Networks, 8 (15): 2524-2535 (2015)Construction of Efficient and Secure Pairing Algorithm and its Application., , and . IACR Cryptol. ePrint Arch., (2007)Quantum Modular Multiplication., , , , and . IEEE Access, (2020)