Author of the publication

Overlap-free Karatsuba-Ofman polynomial multiplication algorithms.

, , , and . IET Information Security, 4 (1): 8-14 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Remote Authentication for Scalable Web-Based Services., , , and . IIH-MSP, page 1113-1117. IEEE Computer Society, (2008)Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture., , and . IPDPS, IEEE Computer Society, (2002)Undeniable Billing in Mobile Communication., and . MobiCom, page 284-290. ACM, (1998)Improving Spectrum Management for Satellite Communication Systems With Hunger Marketing., , , , , and . IEEE Wireless Commun. Letters, 8 (3): 797-800 (2019)Several classes of binary sequences with three-level autocorrelation., , and . IEEE Trans. Information Theory, 45 (7): 2606-2612 (1999)Towards Energy-Efficient Secure Communications Using Biometric Key Distribution in Wireless Biomedical Healthcare Networks., , , , and . BMEI, page 1-5. IEEE, (2009)Using Blockchain to Control Access to Cloud Data., , , and . Inscrypt, volume 11449 of Lecture Notes in Computer Science, page 274-288. Springer, (2018)Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC., , and . ASIACRYPT, volume 1514 of Lecture Notes in Computer Science, page 227-241. Springer, (1998)Loyalty Program Scheme for Anonymous Payment System., , and . EC-Web, volume 1875 of Lecture Notes in Computer Science, page 253-265. Springer, (2000)Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes., , , , and . WISA, volume 2908 of Lecture Notes in Computer Science, page 42-54. Springer, (2003)