From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Designing high-throughput hardware accelerator for stream cipher HC-128., , , и . ISCAS, стр. 1448-1451. IEEE, (2012)Preserving Privacy in Location-Based Services Using Sudoku Structures., , и . ICISS, том 8880 из Lecture Notes in Computer Science, стр. 448-463. Springer, (2014)A Combinatorial Analysis of HC-128., , и . IACR Cryptology ePrint Archive, (2010)A Theoretical Analysis of the Structure of HC-128., , и . IWSEC, том 7038 из Lecture Notes in Computer Science, стр. 161-177. Springer, (2011)Nearby-Friend Discovery Protocol for Multiple Users., , и . CSE (3), стр. 238-243. IEEE Computer Society, (2009)Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers., и . SPACE, том 7644 из Lecture Notes in Computer Science, стр. 32-44. Springer, (2012)