Author of the publication

Memory Tampering Attack on Binary GCD Based Inversion Algorithms.

, , , and . International Journal of Parallel Programming, 47 (4): 621-640 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hardware-software Codesign of Fuzzy Control Systems using FPGAs., , , and . ICINCO (1), page 213-216. INSTICC Press, (2010)Hardware implementation of a background substraction algorithm in FPGA-based platforms., , and . ICIT, page 1688-1693. IEEE, (2015)AES T-Box tampering attack., , and . J. Cryptographic Engineering, 6 (1): 31-48 (2016)Fuzzy Motion-Adaptive Interpolation With Picture Repetition Detection for Deinterlacing., , and . IEEE Trans. Instrumentation and Measurement, 58 (9): 2952-2958 (2009)CAD Tools for Hardware Implementation of Embedded Fuzzy Systems on FPGAs., , , , and . IEEE Trans. Industrial Informatics, 9 (3): 1635-1644 (2013)An automated design flow from linguistic models to piecewise polynomial digital circuits., , , and . ISCAS, page 3317-3320. IEEE, (2010)XFSML: An XML-based modeling language for fuzzy systems., , , and . FUZZ-IEEE, page 1-8. IEEE, (2012)Linguistic summarization of network traffic flows., , , and . FUZZ-IEEE, page 619-624. IEEE, (2008)Implementation of CMOS fuzzy controllers as mixed-signal integrated circuits., , , and . IEEE Trans. Fuzzy Systems, 5 (1): 1-19 (1997)A Fuzzy System for Background Modeling in Video Sequences., , and . WILF, volume 8256 of Lecture Notes in Computer Science, page 184-192. Springer, (2013)