Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Almost involutory recursive MDS diffusion layers., , and . Des. Codes Cryptogr., 87 (2-3): 609-626 (2019)A resilient m-qubit quantum secret sharing scheme using quantum error correction code., , and . Quantum Inf. Process., 23 (2): 58 (February 2024)Applications of design theory for the constructions of MDS matrices for lightweight cryptography., , and . J. Math. Cryptol., 11 (2): 85 (2017)Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes., and . J. Internet Serv. Inf. Secur., 1 (2/3): 161-180 (2011)Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System., , and . INDOCRYPT, volume 4859 of Lecture Notes in Computer Science, page 351-360. Springer, (2007)Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack., , and . IACR Cryptology ePrint Archive, (2015)On the direct construction of recursive MDS matrices., , and . Des. Codes Cryptogr., 82 (1-2): 77-94 (2017)On Diffusion Layers of SPN Based Format Preserving Encryption Schemes: Format Preserving Sets Revisited., , , and . INDOCRYPT, volume 11356 of Lecture Notes in Computer Science, page 91-104. Springer, (2018)On the Direct Construction of MDS and Near-MDS Matrices., , and . CoRR, (2023)Recursive MDS matrices over finite commutative rings., , , and . Discret. Appl. Math., (2021)