From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Analysis of SKINNY under Related-Tweakey Settings., , и . IACR Cryptology ePrint Archive, (2016)MLChain: a privacy-preserving model learning framework using blockchain., , и . Int. J. Inf. Sec., 23 (1): 649-677 (февраля 2024)Cryptanalysis of Kalyna Block Cipher Using Impossible Differential Technique., , и . ICMC, том 1262 из Advances in Intelligent Systems and Computing, стр. 125-141. Springer, (2020)BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level., , , и . Inf. Sci., (2021)Security Analysis of SKINNY under Related-Tweakey Settings (Long Paper)., , и . IACR Trans. Symmetric Cryptol., 2017 (3): 37-72 (2017)Analyzing the uncharted territory of monetizing scam Videos on YouTube., , и . Soc. Netw. Anal. Min., 12 (1): 119 (2022)Hilarious or Hidden? Detecting Sarcasm in Hinglish Tweets using BERT-GRU., , , и . ICCCNT, стр. 1-6. IEEE, (2023)Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256., , , , и . INDOCRYPT, том 9462 из Lecture Notes in Computer Science, стр. 198-217. Springer, (2015)FbHash-E: A time and memory efficient version of FbHash similarity hashing algorithm., , , , и . Digit. Investig., (2022)A Generalized Format Preserving Encryption Framework Using MDS Matrices., , , , и . J. Hardw. Syst. Secur., 3 (1): 3-11 (2019)