Author of the publication

A Compact Rijndael Hardware Architecture with S-Box Optimization.

, , , and . ASIACRYPT, volume 2248 of Lecture Notes in Computer Science, page 239-254. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Munetoh, Seiji
add a person with the name Munetoh, Seiji
 

Other publications of authors with the same name

WS-Attestation: Efficient and Fine-Grained Remote Attestation on Web Services., , , , and . ICWS, page 743-750. IEEE Computer Society, (2005)Security Requirement Modeling Support System Using Software Security Knowledge Base., , , , , , , , and . COMPSAC (2), page 234-239. IEEE Computer Society, (2018)978-1-5386-2667-2.A High-Speed Small RSA Encryption LSI with Low Power Dissipation., , , , , and . ISW, volume 1396 of Lecture Notes in Computer Science, page 174-187. Springer, (1997)Non-intrusive Scalable Memory Access Tracer., , , and . QEST, volume 8657 of Lecture Notes in Computer Science, page 245-248. Springer, (2014)Designing a trust chain for a thin client on a live Linux cd., and . SAC, page 1605-1606. ACM, (2007)Development of a High Bandwidth Merged Logic/DRAM Multimedia Chip., , , , , , , , , and 1 other author(s). ICCD, page 279-285. IEEE Computer Society, (1997)A Compact Rijndael Hardware Architecture with S-Box Optimization., , , and . ASIACRYPT, volume 2248 of Lecture Notes in Computer Science, page 239-254. Springer, (2001)ws-Attestation: Enabling Trusted Computing on Web Services., , , , , and . Test and Analysis of Web Services, Springer, (2007)Model-Assisted Access Control Implementation for Code-centric Ruby-on-Rails Web Application Development., and . ARES, page 350-359. IEEE Computer Society, (2013)Method Using Command Abstraction Library for Iterative Testing Security of Web Applications., and . IJSSE, 6 (3): 26-49 (2015)