Author of the publication

Catalog and Illustrative Examples of Lightweight Cryptographic Primitives.

, , , and . Security of Ubiquitous Computing Systems, Springer International Publishing, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function., , , and . Inf. Process. Lett., 112 (21): 805-810 (2012)An approach for light-weight encryption employing dedicated coding.. GLOBECOM, page 874-880. IEEE, (2012)An Iterative Probabilistic Decoding Algorithm for Binary Linear Block Codes Beyond the Half Minimum Distance.. AAECC, volume 1255 of Lecture Notes in Computer Science, page 237-249. Springer, (1997)The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters., and . SCN, volume 3352 of Lecture Notes in Computer Science, page 310-323. Springer, (2004)An improved key stream generator based on the programmable cellular automata.. ICICS, volume 1334 of Lecture Notes in Computer Science, page 181-191. Springer, (1997)Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence., and . EUROCRYPT, volume 658 of Lecture Notes in Computer Science, page 124-137. Springer, (1992)A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys., , and . DRMTICS, volume 3919 of Lecture Notes in Computer Science, page 258-276. Springer, (2005)A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach., and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 487-491. Springer, (1990)Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel., , , and . Symmetry, 14 (8): 1709 (2022)An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks., , , and . Symmetry, 14 (8): 1711 (2022)