N. M. Siva Mangai

According to our database1, N. M. Siva Mangai authored at least 16 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Hardware Trojans Detection and Prevention Techniques Review.
Wirel. Pers. Commun., May, 2024

Implementation of Efficient Security Algorithm.
Proceedings of the 7th International Conference on Devices, Circuits and Systems, 2024

2023
Design of INV/BUFF Logic Locking For Enhancing the Hardware Security.
J. Electron. Test., April, 2023

2022
Design and Evaluation of XOR Arbiter Physical Unclonable Function and its Implementation on FPGA in Hardware Security Applications.
J. Electron. Test., December, 2022

Hardware Obfuscation for IP Protection of DSP Applications.
J. Electron. Test., 2022

2021
A broadband MVDR beamforming core for ultrasound imaging.
Integr., 2021

2020
Design of AWC core using DCD iterations for MVDR beamformer.
Microprocess. Microsystems, 2020

2019
Architecture and FPGA prototype of cycle stealing DMA array signal processor for ultrasound sector imaging systems.
Microprocess. Microsystems, 2019

An Efficient Wavelet Based Transient Current Test towards Detection of Data Retention Faults in SRAM.
J. Electron. Test., 2019

Design and Physical Implementation of Array Signal Processor ASIC for Sector Imaging Systems.
Proceedings of the 32nd International Conference on VLSI Design and 18th International Conference on Embedded Systems, 2019

2017
High Throughput AES Algorithm Using Parallel Subbytes and MixColumn.
Wirel. Pers. Commun., 2017

An Efficient Hardware Architecture for High Throughput AES Encryptor Using MUX Based Sub Pipelined S-Box.
Wirel. Pers. Commun., 2017

2015
PSP CO2: An Efficient Hardware Architecture for AES Algorithm for High Throughput.
Wirel. Pers. Commun., 2015

Efficient hardware implementation of AES algorithm using bio metric key.
Int. J. Inf. Commun. Technol., 2015

Recognition of elephants in infrared images using clustering-based image segmentation.
Int. J. Electron. Secur. Digit. Forensics, 2015

2012
Survey on Efficient, Low-power, AES Image Encryption and Bio-cryptography Schemes.
Smart Comput. Rev., 2012


  Loading...