Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Truncated Differential Attacks: New Insights and 10-round Attacks on QARMA., , , , and . IACR Cryptol. ePrint Arch., (2023)Ciphertext Policy Attribute Based Encryption for Arithmetic circuits., and . IACR Cryptol. ePrint Arch., (2021)Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol., , , , and . IACR Cryptology ePrint Archive, (2015)An Improved Truncated Di fferential Cryptanalysis of KLEIN., , , and . IACR Cryptology ePrint Archive, (2014)Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher., , and . IACR Cryptology ePrint Archive, (2013)Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard., , and . IACR Cryptology ePrint Archive, (2013)Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity., , , and . ISeCure, 11 (1): 57-74 (2019)Security enhancements against UMTS-GSM interworking attacks., , and . Comput. Networks, 54 (13): 2256-2270 (2010)Robust Design of Widely Linear Pre-Equalization Filters for Pre-Rake UWB Systems., and . IEEE Trans. Commun., 61 (10): 4206-4217 (2013)Design of Pre-Rake DS-UWB Downlink with Pre-Equalization., , and . IEEE Trans. Commun., 60 (2): 400-410 (2012)