From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security analysis of LMAP++, an RFID authentication protocol., , , и . ICITST, стр. 689-694. IEEE, (2011)On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol., , , , и . DPM/SETOP, том 7122 из Lecture Notes in Computer Science, стр. 90-103. Springer, (2011)On the Designing of EPC C1 G2 Authentication protocol using AKARI-1 and AKARI-2 PRNGs., , и . Inf. Technol. Control., 44 (1): 41-53 (2015)New differential fault analysis on PRESENT., , и . EURASIP J. Adv. Signal Process., (2013)Cryptanalysis of Chen et al.'s RFID Access Control Protocol., , и . IACR Cryptology ePrint Archive, (2011)On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems., , и . Future Internet, 10 (9): 82 (2018)DPA Protected Implementation of OCB and COLM Authenticated Ciphers., , и . IEEE Access, (2019)Cryptanalysis of SIMON Variants with Connections., , , , , , , и . RFIDSec, том 8651 из Lecture Notes in Computer Science, стр. 90-107. Springer, (2014)A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments., , , , , , , и . IEEE Access, (2020)Reliable advanced encryption standard hardware implementation: 32- bit and 64-bit data-paths., , и . Microprocess. Microsystems, (2021)