Author of the publication

A Coding Theoretic Approach towards Symmetrization in Reversible Circuit Synthesis.

, , and . J. Multiple Valued Log. Soft Comput., 35 (3-4): 239-262 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers., , and . IACR Cryptology ePrint Archive, (2015)Fault Location Identification By Machine Learning., , , , and . IACR Cryptol. ePrint Arch., (2020)To infect or not to infect: a critical analysis of infective countermeasures in fault attacks., , and . J. Cryptogr. Eng., 10 (4): 355-374 (2020)Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results., , and . IACR Cryptol. ePrint Arch., (2022)Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks (Extended Version)., , , , and . IACR Cryptol. ePrint Arch., (2020)BAKSHEESH: Similar Yet Different From GIFT., , , , , , , , , and 7 other author(s). IACR Cryptol. ePrint Arch., (2023)Quantum Implementation and Analysis of SHA-2 and SHA-3., , , , , , and . IACR Cryptol. ePrint Arch., (2024)A Coding Theoretic Approach towards Symmetrization in Reversible Circuit Synthesis., , and . J. Multiple Valued Log. Soft Comput., 35 (3-4): 239-262 (2020)Quantum implementation and resource estimates for Rectangle and Knot., , , , and . Quantum Inf. Process., 20 (12): 395 (2021)POSTER: Optimizing Device Implementation of Linear Layers with Automated Tools., , and . ACNS Workshops, volume 12809 of Lecture Notes in Computer Science, page 500-504. Springer, (2021)