Search for persons
X
?
2022 IEEE 6th Conference on Information and Communication Technology (CICT) ,
7
Detection of Hardware Trojan using CNN with Residual Networ:
, In:
?
2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA) ,
9
Random Number Generation for PKI Using Controlled Anderson ..:
, In:
?
Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography ,
12
Modular Exponential Techniques:
, In:
?
Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography ,
13
RSA Processor for Concurrent Cryptographic Transformations:
, In:
?
Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography ,
14