Author of the publication

Breaking Kalyna 128/128 with Power Attacks.

, , , , and . SPACE, volume 10076 of Lecture Notes in Computer Science, page 402-414. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures., and . Security and Management, page 314-317. CSREA Press, (2009)Feature Extraction and Feature Selection: Reducing Data Complexity with Apache Spark., and . CoRR, (2017)Higher Order Side-Channel Attacks Resilient S-boxes., , , and . IACR Cryptology ePrint Archive, (2018)A Note on a Signature Building Block and Relevant Security Reduction in the Green-Hohenberger OT Scheme., , and . Inscrypt, volume 8567 of Lecture Notes in Computer Science, page 282-288. Springer, (2013)Reducing Data Complexity in Feature Extraction and Feature Selection for Big Data Security Analytics., and . ICDIS, page 43-48. IEEE, (2018)A note on "new quantum key agreement protocols based on Bell states"., and . Quantum Inf. Process., 20 (2): 74 (2021)Anonymous Fair Auction on Blockchain., , , , and . NTMS, page 1-5. IEEE, (2021)Automating Feature Extraction and Feature Selection in Big Data Security Analytics., and . ICAISC (2), volume 10842 of Lecture Notes in Computer Science, page 423-432. Springer, (2018)MicroLET: A New SDNoC-Based Communication Protocol for ChipLET-Based Systems., , , , , and . DSD, page 61-68. IEEE, (2019)Key Management as a Service., , and . SECRYPT, page 276-281. SciTePress, (2012)