Author of the publication

RunFein: a rapid prototyping framework for Feistel and SPN-based block ciphers.

, , , and . J. Cryptogr. Eng., 6 (4): 299-323 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Necessary and Sufficient Number of Cops in the Game of Cops and Robber in Multidimensional Grids, , and . CoRR, (2009)On biases of permutation and keystream bytes of RC4 towards the secret key., and . Cryptogr. Commun., 1 (2): 225-268 (2009)Preserving Privacy in Location-Based Services Using Sudoku Structures., , and . ICISS, volume 8880 of Lecture Notes in Computer Science, page 448-463. Springer, (2014)Towards a More Democratic Mining in Bitcoins., , and . ICISS, volume 8880 of Lecture Notes in Computer Science, page 185-203. Springer, (2014)One Word/Cycle HC-128 Accelerator via State-Splitting Optimization., , , and . INDOCRYPT, volume 8885 of Lecture Notes in Computer Science, page 283-303. Springer, (2014)Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck., and . ACISP, volume 5107 of Lecture Notes in Computer Science, page 306-320. Springer, (2008)Keyless Steganography in Spatial Domain Using Energetic Pixels., , , and . ICISS, volume 7671 of Lecture Notes in Computer Science, page 134-148. Springer, (2012)Locating secret messages in images., and . KDD, page 545-550. ACM, (2004)On effective sharing of user generated content., and . APCHI, page 114-118. ACM, (2013)A PVD based high capacity steganography algorithm with embedding in non-sequential position., , , and . Multim. Tools Appl., 79 (19-20): 13449-13479 (2020)