Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security, Privacy, and Trust on Internet of Things., , , and . Wirel. Commun. Mob. Comput., (2019)Analysis of differential distribution of lightweight block cipher based on parallel processing on GPU., , , , , and . J. Inf. Secur. Appl., (2020)Automated enumeration of block cipher differentials: An optimized branch-and-bound GPU framework., , and . J. Inf. Secur. Appl., (2022)Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format., , , , , and . IEEE Trans. Serv. Comput., 14 (5): 1357-1369 (2021)Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation., , , , , , and . Symmetry, 11 (2): 272 (2019)Chatting Application Monitoring on Android System and its Detection based on the Correlation Test., , and . APSIPA, page 1556-1563. IEEE, (2018)Weight Matters: An Empirical Investigation of Distance Oracles on Knowledge Graphs., , , and . CIKM, page 4440-4444. ACM, (2023)Cryptanalysis of Raindrop and FBC., , , , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 536-551. Springer, (2019)Distributed Pseudo-Random Number Generation and Its Application to Cloud Database., , and . ISPEC, volume 8434 of Lecture Notes in Computer Science, page 373-387. Springer, (2014)Generalized RC4 Key Collisions and Hash Collisions., and . SCN, volume 6280 of Lecture Notes in Computer Science, page 73-87. Springer, (2010)