Author of the publication

MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems.

, , , , and . IACR Cryptology ePrint Archive, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DSSH: Digital signature based secure handover for network-based mobility management., , and . Comput. Syst. Sci. Eng., (2012)A Framework for the User-Oriented Personal Information Protection., and . Security and Management, page 12-19. CSREA Press, (2006)A Merging Method of Certification Authorities Without Using Cross-Certifications., and . AINA (2), page 174-177. IEEE Computer Society, (2004)Efficient Computing over GF(2^16) Using Graphics Processing Unit., , , , and . IMIS, page 843-846. IEEE Computer Society, (2013)Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks., , , and . J. Inf. Sci. Eng., 31 (2): 727-742 (2015)Cyberbullying detection using parent-child relationship between comments., , , and . iiWAS, page 325-334. ACM, (2016)A new security middleware architecture based on fog computing and cloud to support IoT constrained devices., , and . IML, page 35:1-35:8. ACM, (2017)Tracing MIRAI Malware in Networked System., , , and . CANDAR Workshops, page 534-538. IEEE Computer Society, (2018)Enforcement of Integrated Security Policy in Trusted Operating Systems., , , and . IWSEC, volume 4752 of Lecture Notes in Computer Science, page 214-229. Springer, (2007)Evasion Attacks Against Statistical Code Obfuscation Detectors., , and . IWSEC, volume 10418 of Lecture Notes in Computer Science, page 121-137. Springer, (2017)