From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure extensions of FPGA soft core processors for symmetric key cryptography., , , и . ReCoSoC, стр. 1-8. IEEE, (2011)A survey of AIS-20/31 compliant TRNG cores suitable for FPGA devices., , , , и . FPL, стр. 1-10. IEEE, (2016)Experimental Study of Locking Phenomena on Oscillating Rings Implemented in Logic Devices., , , и . IEEE Trans. Circuits Syst. I Regul. Pap., 66-I (7): 2560-2571 (2019)Backtracking Search for Optimal Parameters of a PLL-based True Random Number Generator., , , и . DATE, стр. 1-6. IEEE, (2020)Design and Implementation of a Multi-Core Crypto-Processor for Software Defined Radios., , , , и . ARC, том 6578 из Lecture Notes in Computer Science, стр. 29-40. Springer, (2011)TrustSoC: Light and Efficient Heterogeneous SoC Architecture, Secure-by-design., , , , и . AsianHOST, стр. 1-6. IEEE, (2023)Low-Latency Masking with Arbitrary Protection Order Based on Click Elements., , , , , и . HOST, стр. 36-47. IEEE, (2023)JTAG Combined Attack - Another Approach for Fault Injection., , и . NTMS, стр. 1-5. IEEE, (2016)Hardware security: From concept to application., , , и . EWME, стр. 1-6. IEEE, (2016)Restoration protocol: Lightweight and secur devices authentication based on PUF., и . VLSI-SoC, стр. 1-6. IEEE, (2017)