Author of the publication

Evolutionary Design of Message Efficient Secrecy Amplification Protocols.

, , , and . EuroGP, volume 7244 of Lecture Notes in Computer Science, page 194-205. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attack Detection vs. Privacy - How to Find the Link or How to Hide It?, , , and . Security Protocols Workshop, volume 7114 of Lecture Notes in Computer Science, page 189-199. Springer, (2011)Reconsidering Attacker Models in Ad-Hoc Networks., , and . Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 219-227. Springer, (2016)Reconsidering Attacker Models in Ad-Hoc Networks (Transcript of Discussion).. Security Protocols Workshop, volume 10368 of Lecture Notes in Computer Science, page 228-231. Springer, (2016)Minerva: The curse of ECDSA nonces., , , and . IACR Cryptol. ePrint Arch., (2020)Smart Dust Security - Key Infection Revisited., and . STM, volume 157 of Electronic Notes in Theoretical Computer Science, page 11-25. Elsevier, (2005)Large-scale Randomness Study of Security Margins for 100+ Cryptographic Functions., , , , and . SECRYPT, page 134-146. SCITEPRESS, (2022)Towards Cryptographic Function Distinguishers with Evolutionary Circuits., , and . SECRYPT, page 135-146. SciTePress, (2013)Security and Robustness of Wireless Sensor Networks., and . ERCIM News, (2009)Avalanche Effect in Improperly Initialized CAESAR Candidates., and . MEMICS, volume 233 of EPTCS, page 72-81. (2016)On Secrecy Amplification Protocols., , and . WISTP, volume 9311 of Lecture Notes in Computer Science, page 3-19. Springer, (2015)