default search action
Pulkit Singh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]K. Abhimanyu Kumar Patro, Pulkit Singh, Narendra Khatri, Bibhudendra Acharya:
Chaotic multiple-image encryption scheme: a simple and highly efficient solution for diverse applications. J. Electronic Imaging 33(4) (2024) - [c5]Mary C. Tedeschi, Deep Manish Mehta, Pulkit Singh, Aman Prakash, Tanmay Mehta, Sejal Arora, Yousuf Aafreen:
Reflections - Remote Teaching Patterns in a Hybrid Teaching Context. EuroPLoP 2024: 30:1-30:15 - 2023
- [j13]Pulkit Singh, Rahul Kumar Chaurasiya, Bibhudendra Acharya:
Modelling and optimisation of high-speed KLEIN architectures on FPGA and ASIC platforms for IoT applications. Int. J. Ad Hoc Ubiquitous Comput. 42(4): 207-225 (2023) - [j12]Kaluri Praveen Raja, Pulkit Singh, Zeesha Mishra, Bibhudendra Acharya:
Efficient area and throughput implementations of lightweight Simeck cipher for resource-constrained applications. Int. J. Ad Hoc Ubiquitous Comput. 43(3): 170-182 (2023) - [j11]Kaluri Praveen Raja, Zeesha Mishra, Pulkit Singh, Bibhudendra Acharya:
Efficient hardware implementations of lightweight Simeck Cipher for resource-constrained applications. Integr. 88: 343-352 (2023) - [j10]Abhiram Kumar, Pulkit Singh, K. Abhimanyu Kumar Patro, Bibhudendra Acharya:
High-throughput and area-efficient architectures for image encryption using PRINCE cipher. Integr. 90: 224-235 (2023) - [j9]Pulkit Singh, Bhaskar Agrawal, Rahul Kumar Chaurasiya, Bibhudendra Acharya:
Low-area and high-speed hardware architectures of KLEIN lightweight block cipher for image encryption. J. Electronic Imaging 32(1) (2023) - [c4]Linga Pallavi, Pulkit Singh, Bijayananda Patnaik, Bibhudendra Acharya:
High frequency architecture of lightweight authenticated cipher ASCON-128 for resource-constrained IoT devices. OCIT 2023: 405-410 - [c3]Kiran Chand Ravi, Bittu Kumar, M. Ranjeeth, Kiran Dasari, Pulkit Singh, K. Sai Pavan:
Implementation of Panoramic Image Stitching using Python. ICCCNT 2023: 1-7 - [c2]Ilia Sucholutsky, Ruairidh M. Battleday, Katherine M. Collins, Raja Marjieh, Joshua C. Peterson, Pulkit Singh, Umang Bhatt, Nori Jacoby, Adrian Weller, Thomas L. Griffiths:
On the informativeness of supervision signals. UAI 2023: 2036-2046 - 2022
- [j8]Pulkit Singh, K. Abhimanyu Kumar Patro, Bibhudendra Acharya, Rahul Kumar Chaurasiya:
Efficient hardware architectures of Lilliput lightweight algorithm for image encryption. Int. J. Ad Hoc Ubiquitous Comput. 41(4): 205-220 (2022) - [j7]Pulkit Singh, Bibhudendra Acharya, Rahul Kumar Chaurasiya:
Low-area and high-speed hardware architectures of LBlock cipher for Internet of Things image encryption. J. Electronic Imaging 31(3) (2022) - [j6]Manisha Kumari, Pulkit Singh, Bibhudendra Acharya:
Secure image encryption using high throughput architectures of PRINT cipher for radio frequency identification applications. J. Electronic Imaging 31(6) (2022) - [j5]Shaan Khurshid, Christopher Reeder, Lia X. Harrington, Pulkit Singh, Gopal Sarma, Samuel F. Friedman, Paolo Di Achille, Nathaniel Diamant, Jonathan W. Cunningham, Ashby C. Turner, Emily S. Lau, Julian S. Haimovich, Mostafa A. Al-Alusi, Xin Wang, Marcus D. R. Klarqvist, Jeffrey M. Ashburner, Christian Diedrich, Mercedeh Ghadessi, Johanna Mielke, Hanna M. Eilken, Alice McElhinney, Andrea Derix, Steven J. Atlas, Patrick T. Ellinor, Anthony A. Philippakis, Christopher D. Anderson, Jennifer E. Ho, Puneet Batra, Steven A. Lubitz:
Cohort design and natural language processing to reduce bias in electronic health records research. npj Digit. Medicine 5 (2022) - 2021
- [j4]Piyush Modi, Pulkit Singh, Bibhudendra Acharya:
Effective hardware architectures for LED and PRESENT ciphers for resource-constrained applications. Int. J. High Perform. Syst. Archit. 10(2): 89-104 (2021) - 2020
- [j3]Nivedita Shrivastava, Pulkit Singh, Bibhudendra Acharya:
Efficient hardware implementations of QTL cipher for RFID applications. Int. J. High Perform. Syst. Archit. 9(1): 1-10 (2020) - [j2]Gandu Ramu, Zeesha Mishra, Pulkit Singh, Bibhudendra Acharya:
Performance optimised architectures of Piccolo block cipher for low resource IoT applications. Int. J. High Perform. Syst. Archit. 9(1): 49-57 (2020) - [c1]Pulkit Singh, Joshua C. Peterson, Ruairidh M. Battleday, Tom Griffiths:
End-to-end Deep Prototype and Exemplar Models for Predicting Human Behavior. CogSci 2020 - [i1]Pulkit Singh, Joshua C. Peterson, Ruairidh M. Battleday, Thomas L. Griffiths:
End-to-end Deep Prototype and Exemplar Models for Predicting Human Behavior. CoRR abs/2007.08723 (2020)
2010 – 2019
- 2019
- [j1]Pulkit Singh, Bibhudendra Acharya, Rahul Kumar Chaurasiya:
A comparative survey on lightweight block ciphers for resource constrained applications. Int. J. High Perform. Syst. Archit. 8(4): 250-270 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint