Author of the publication

Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs.

, , and . IACR Cryptology ePrint Archive, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Ranasinghe, Damith Chinthana
add a person with the name Ranasinghe, Damith Chinthana
 

Other publications of authors with the same name

Adding sense to the Internet of Things - An architecture framework for Smart Object systems., , , and . Personal and Ubiquitous Computing, 16 (3): 291-308 (2012)Wireless sensing platform for remote monitoring and control of wine fermentation., , , and . ISSNIP, page 503-508. IEEE, (2013)Facilitating Efficient Object Tracking in Large-Scale Traceability Networks., , and . Comput. J., 54 (12): 2053-2071 (2011)A novel hybrid powered RFID sensor tag., , , , and . IEEE RFID, page 55-62. IEEE, (2015)Enabling through life product-instance management: Solutions and challenges., , , and . J. Network and Computer Applications, 34 (3): 1015-1031 (2011)DeepCleanse: Input Sanitization Framework Against Trojan Attacks on Deep Neural Network Systems., , and . CoRR, (2019)SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices., , , , , and . CoRR, (2018)Lightweight (Reverse) Fuzzy Extractor with Multiple Referenced PUF Responses., , , and . CoRR, (2018)Efficient Erasable PUFs from Programmable Logic and Memristors., , , , , , , , , and . IACR Cryptology ePrint Archive, (2018)Deep Auto-Set: A Deep Auto-Encoder-Set Network for Activity Recognition Using Wearables., , , , and . MobiQuitous, page 246-253. ACM, (2018)