Author of the publication

Merging the Camellia, SMS4 and AES S-Boxes in a Single S-Box with Composite Bases.

, , and . ISC, volume 7807 of Lecture Notes in Computer Science, page 209-217. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid Method for Detecting Masqueraders Using Session Folding and Hidden Markov Models., , , and . MICAI, volume 4293 of Lecture Notes in Computer Science, page 622-631. Springer, (2006)Cryptographic-Speech-Key Generation Architecture Improvements., , and . IbPRIA (2), volume 3523 of Lecture Notes in Computer Science, page 579-585. Springer, (2005)Biometric-Iris Random Key Generator Using Generalized Regression Neural Networks., , and . IEA/AIE, volume 4031 of Lecture Notes in Computer Science, page 530-539. Springer, (2006)On the Use of Automatic Speech Recognition for Spoken Information Retrieval from Video Databases., and . CIARP, volume 3287 of Lecture Notes in Computer Science, page 381-385. Springer, (2004)Some Representations of the S-Box of Camellia in GF(((22)2)2)., , and . CANS, 7712, page 296-309. Springer, (2012)Robustness of Bit-stream Based Features for Speaker Verification., , and . ICASSP (1), page 749-752. IEEE, (2005)Adaptive Resource Allocation with Job Runtime Uncertainty., , , , and . J. Grid Comput., 15 (4): 415-434 (2017)Characterisation, design and simulation of an efficient peer-to-peer content distribution system for enterprise networks., , , and . Peer-to-Peer Netw. Appl., 10 (1): 122-137 (2017)Spoken information retrieval for multimedia databases., , and . AICCSA, page 146. IEEE Computer Society, (2005)Optimization of the DET curve in speaker verification under noisy conditions., , and . ICASSP, page 7765-7769. IEEE, (2013)