Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Structure Property of PCR's Adjacency Graph with a Prime Order and Its Application of Constructing M-Sequences., , , and . Inscrypt, volume 12612 of Lecture Notes in Computer Science, page 307-317. Springer, (2020)New Treatment of the BSW Sampling and Its Applications to Stream Ciphers., , , and . AFRICACRYPT, volume 8469 of Lecture Notes in Computer Science, page 136-146. Springer, (2014)Extended Reality and Internet of Things for Hyper-Connected Metaverse Environments., , and . CoRR, (2023)Impossible Differential Cryptanalysis and a Security Evaluation Framework for AND-RX Ciphers., , , , , , and . IEEE Trans. Inf. Theory, 70 (8): 6025-6040 (August 2024)Breaking LWC candidates: sESTATE and Elephant in quantum setting., , , , and . Des. Codes Cryptogr., 89 (7): 1405-1432 (2021)An XRI Mixed-Reality Internet-of-Things Architectural Framework Toward Immersive and Adaptive Smart Environments., , and . ISMAR Adjunct, page 68-74. IEEE, (2021)Extended-XRI Body Interfaces for Hyper-Connected Metaverse Environments., and . GEM, page 1-6. IEEE, (2022)New Related Key Attacks on the RAKAPOSHI Stream Cipher., , , , , and . ISPEC, volume 9065 of Lecture Notes in Computer Science, page 65-75. Springer, (2015)Guess and Determine Attack on SOSEMANUK., and . IAS, page 658-661. IEEE Computer Society, (2009)Real-Time Related-Key Attack on Full-Round Shadow Designed for IoT Nodes., , , , , , and . IEEE Trans. Computers, 73 (2): 613-620 (February 2024)