Author of the publication

A Combinatorics Proliferation Model with Threshold for Malware Countermeasure.

, , and . J. Inf. Process., (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending Bleichenbacher's Forgery Attack., , and . J. Inf. Process., (2008)Differential Cryptanalysis of a Reduced-Round SEED., and . SCN, volume 2576 of Lecture Notes in Computer Science, page 186-198. Springer, (2002)Experiments on the Linear Algebra Step in the Number Field Sieve., , and . IWSEC, volume 4752 of Lecture Notes in Computer Science, page 58-73. Springer, (2007)Practical Packing Method in Somewhat Homomorphic Encryption., , , , and . DPM/SETOP, volume 8247 of Lecture Notes in Computer Science, page 34-50. Springer, (2013)Improved fast software implementation of block ciphers., , and . ICICS, volume 1334 of Lecture Notes in Computer Science, page 269-273. Springer, (1997)Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward., , , and . WISA, volume 7115 of Lecture Notes in Computer Science, page 40-54. Springer, (2011)Development of the Lead-Free Brush Material for the High-Load Starter., , , , , , , and . IEICE Trans. Electron., 90-C (8): 1634-1642 (2007)The Block Cipher SC2000., , , , , , , and . FSE, volume 2355 of Lecture Notes in Computer Science, page 312-327. Springer, (2001)Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model., , and . ICETE (Selected Papers), volume 23 of Communications in Computer and Information Science, page 125-138. Springer, (2007)Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption., , , , and . ACISP, volume 8544 of Lecture Notes in Computer Science, page 338-353. Springer, (2014)