Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation and Evaluation of an Identity-Based Encryption with Security Against the KGC., , , and . CANDAR (Workshops), page 320-325. IEEE, (2021)A Generic Construction of Integrated Secure-Channel Free PEKS and PKE., , and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 69-86. Springer, (2018)Output Prediction Attacks on Block Ciphers Using Deep Learning., , , , , and . ACNS Workshops, volume 13285 of Lecture Notes in Computer Science, page 248-276. Springer, (2022)Slide Property of RAKAPOSHI and Its Application to Key Recovery Attack., , and . Inf. Media Technol., 8 (4): 987-994 (2013)Detecting Fake QR Codes Using Information from Error-Correction., , , , , , , , , and 2 other author(s). J. Inf. Process., (2021)Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations., , , and . Comput. J., 62 (4): 614-630 (2019)FMS Attack-Resistant WEP Implementation Is Still Broken., , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 17-26. Springer, (2005)Neural-Network-Based Pseudo-Random Number Generator Evaluation Tool for Stream Ciphers., , and . CANDAR Workshops, page 333-338. IEEE, (2019)Expanding Weak-key Space of RC4., , , and . J. Inf. Process., 22 (2): 357-365 (2014)Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (1): 164-171 (2010)