From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Comparing GNG3D and Quadric Error Metrics Methods to Simplify 3D Meshes., , , и . GRAPP, стр. 99-102. INSTICC Press, (2009)An efficient binary sequence generator with cryptographic applications., , , и . Appl. Math. Comput., 167 (1): 16-27 (2005)Randomness analysis and generation of key-derived s-boxes., и . Logic Journal of the IGPL, 24 (1): 68-79 (2016)S-Boxes, APN Functions and Related Codes., и . Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, том 23 из NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2009)Analysis and design of a secure key exchange scheme., , , и . Inf. Sci., 179 (12): 2014-2021 (2009)A Non-abelian Group Based on Block Upper Triangular Matrices with Cryptographic Applications., , , и . AAECC, том 5527 из Lecture Notes in Computer Science, стр. 117-126. Springer, (2009)Cryptographic Applications of 3x3 Block Upper Triangular Matrices., , , и . HAIS (2), том 7209 из Lecture Notes in Computer Science, стр. 97-104. Springer, (2012)A mesh optimization algorithm based on neural networks., , , и . Inf. Sci., 177 (23): 5347-5364 (2007)Optimizing a Password Hashing Function with Hardware-Accelerated Symmetric Encryption., , и . Symmetry, 10 (12): 705 (2018)A Malware Detection Approach Based on Feature Engineering and Behavior Analysis., , и . IEEE Access, (2023)