Search for persons
X
?
Advances in Information, Communication and Cybersecurity; Lecture Notes in Networks and Systems ,
1
Two-Stage Pipelining Implementation of the Secure Hash Algo..:
, In:
?
2019 International Conference on Systems of Collaboration Big Data, Internet of Things & Security (SysCoBIoTS) ,
3
An optimal hardware implementation of the KECCAK hash funct..:
, In:
?
2019 International Conference on Systems of Collaboration Big Data, Internet of Things & Security (SysCoBIoTS) ,
4
An optimal hardware implementation of the KECCAK hash funct..:
, In:
?
Proceedings of the 4th international conference on Intelligent Robotics and Applications - Volume Part I ,
13
Parallel-Populations genetic algorithm for the optimization..:
, In:
?
Intelligent Robotics and Applications; Lecture Notes in Computer Science ,
14