Author of the publication

On the Correctness of An Approach Against Side-channel attacks.

, , , and . IACR Cryptology ePrint Archive, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DHFNet: dual-decoding hierarchical fusion network for RGB-thermal semantic segmentation., , , , and . Vis. Comput., 40 (1): 169-179 (January 2024)Diagnosis of atrial fibrillation using self-complementary attentional convolutional neural network., , , , , , and . Comput. Methods Programs Biomed., (August 2023)UTLNet: Uncertainty-Aware Transformer Localization Network for RGB-Depth Mirror Segmentation., , , , and . IEEE Trans. Multim., (2024)Single Key Variant of PMAC_Plus., , , , and . IACR Trans. Symmetric Cryptol., 2017 (4): 268-305 (2017)Effective Velocity Calculation Method in Passive Synthetic Aperture for Emitter Localization., , , , , and . GLOBECOM, page 4191-4195. IEEE, (2022)Combining Dynamic Constrained Many-Objective Optimization with DE to Solve Constrained Optimization Problems., , , and . ISICA, volume 575 of Communications in Computer and Information Science, page 64-73. Springer, (2015)Extended Models for Message Authentication., , and . ICISC, volume 5461 of Lecture Notes in Computer Science, page 286-301. Springer, (2008)Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes., , and . ACISP, volume 9144 of Lecture Notes in Computer Science, page 3-19. Springer, (2015)On the Correctness of An Approach Against Side-channel attacks., , , and . IACR Cryptology ePrint Archive, (2008)Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP., , , and . IACR Trans. Symmetric Cryptol., 2016 (2): 288-306 (2016)