Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Method for Pseudo-probabilistic Block Encryption., , , , and . INISCOM, volume 221 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 321-331. Springer, (2017)Optimisation de la précision de calcul pour la réduction d'énergie des systèmes embarqués. (Accuracy Optimization for Energy Consumption Reduction in Embedded Systems).. University of Rennes 1, France, (2011)Exploiting reconfigurable SWP operators for multimedia applications., , , , , , and . ICASSP, page 1717-1720. IEEE, (2011)Dynamic Precision Scaling for Low Power WCDMA Receiver., , and . ISCAS, page 205-208. IEEE, (2009)Post-quantum Cryptoschemes: New Finite Non-commutative Algebras for Defining Hidden Logarithm Problem., , , , , and . ICCASA/ICTCC, volume 266 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 183-194. Springer, (2018)Design of optimized fixed-point WCDMA receiver., , and . EUSIPCO, page 993-997. IEEE, (2009)High-Level Synthesis under Fixed-Point Accuracy Constraint., , , and . J. Electrical and Computer Engineering, (2012)Software practices in five ASEAN countries: an exploratory study., , , , and . ICSE, page 628-631. ACM, (2006)Authenticated Key Exchange, Signcryption and Deniable Signcryption Protocols Based on Two Hard Problems., , , , , and . ACOMP, page 16-22. IEEE Computer Society, (2017)New Blind Mutisignature Schemes Based on Signature Standards., , , , and . ACOMP, page 23-27. IEEE Computer Society, (2017)