Author of the publication

Novel Approaches to Protecting Block Ciphers by Distributing Round Keys.

, , , and . AINA, page 812-816. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time sequential pattern mining for USN system., , and . ICUIMC, page 36:1-36:6. ACM, (2012)Performance evaluation of codebook designs for FD-MIMO with multiple panel array systems., , , , , , and . WCNC, page 1-5. IEEE, (2018)Some Observations for Portfolio Management Applications of Modern Machine Learning Methods., , , , , and . Int. J. Fuzzy Log. Intell. Syst., 16 (1): 44-51 (2016)PGA: Personalizing Grasping Agents with Single Human-Robot Interaction., , , , , and . CoRR, (2023)Soliciting Unexpected Traffic Flows into VoLTE., , , and . IMIS, page 426-430. IEEE Computer Society, (2015)Robust Map Fusion with Visual Attention Utilizing Multi-agent Rendezvous., , and . ICRA, page 2062-2068. IEEE, (2023)A Wideband Capacity Maximization Approach for CSI Feedback in Frequency Selective Channels., , , , , , and . GLOBECOM, page 5935-5940. IEEE, (2022)Novel Approaches to Protecting Block Ciphers by Distributing Round Keys., , , and . AINA, page 812-816. IEEE Computer Society, (2015)A study on CEP performance in mobile embedded system., , , and . ICTC, page 49-50. IEEE, (2012)Joint Design of Fronthauling and Hybrid Beamforming for Downlink C-RAN Systems., , , , and . CoRR, (2019)