Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

White-Box Cryptography: A Time-Security Trade-Off for the SPNbox Family., , and . WIDECOM, volume 27 of Lecture Notes on Data Engineering and Communications Technologies, page 153-166. Springer, (2019)Understanding Optimizations and Measuring Performances of PBKDF2., and . WIDECOM, volume 27 of Lecture Notes on Data Engineering and Communications Technologies, page 101-114. Springer, (2019)Detection and Analysis of Unexpected State Components in Biological Systems., and . CMSB, volume 2602 of Lecture Notes in Computer Science, page 172. Springer, (2003)A Type-2 Fuzzy Set Recognition Algorithm for Artificial Immune Systems., and . HAIS, volume 5271 of Lecture Notes in Computer Science, page 491-498. Springer, (2008)Measuring Performances of a White-Box Approach in the IoT Context., , , , , and . Symmetry, 11 (8): 1000 (2019)EZK: A Zero Knowledge Tool for Generating, Handling, and Securing Electronic Bills of Lading.. WEBIST (3), page 238-241. INSTICC Press, (2007)Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives., , , , , , , and . IACR Cryptol. ePrint Arch., (2024)Effects of central tendency measures on term weighting in textual information retrieval., , and . Soft Comput., 25 (11): 7341-7378 (2021)Detecting misbehaving nodes in MANET with an artificial immune system based on type-2 fuzzy sets., and . ICITST, page 1-2. IEEE, (2009)Differential Fault Attacks against AES Tampering with the Instruction Flow., , and . SECRYPT, page 439-444. SciTePress, (2014)