Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of SKINNY under Related-Tweakey Settings., , and . IACR Cryptology ePrint Archive, (2016)MLChain: a privacy-preserving model learning framework using blockchain., , and . Int. J. Inf. Sec., 23 (1): 649-677 (February 2024)Cryptanalysis of Kalyna Block Cipher Using Impossible Differential Technique., , and . ICMC, volume 1262 of Advances in Intelligent Systems and Computing, page 125-141. Springer, (2020)A Generalized Format Preserving Encryption Framework Using MDS Matrices., , , , and . J. Hardw. Syst. Secur., 3 (1): 3-11 (2019)FbHash-E: A time and memory efficient version of FbHash similarity hashing algorithm., , , , and . Digit. Investig., (2022)A Study on Characterizing the Ecosystem of Monetizing Video Spams on YouTube Platform., , and . iiWAS, page 222-231. ACM, (2019)Temporal Analysis of Privacy Enhancing Technology Traffic Using Deep Learning., , and . SocialSec, volume 14097 of Lecture Notes in Computer Science, page 239-251. Springer, (2023)eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices., , , , and . SPACE, volume 10662 of Lecture Notes in Computer Science, page 133-150. Springer, (2017)BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level., , , and . Inf. Sci., (2021)Analyzing the uncharted territory of monetizing scam Videos on YouTube., , and . Soc. Netw. Anal. Min., 12 (1): 119 (2022)