Author of the publication

Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition.

, , , , , and . Frontiers Inf. Technol. Electron. Eng., 19 (12): 1475-1499 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strength-Strength and Strength-Degree Correlation Measures for Directed Weighted Complex Network Analysis., , , and . IEICE Trans. Inf. Syst., 94-D (11): 2284-2287 (2011)A unified semantic description and user's permissions knowledge reasoning for multiple domain cyberspace based on knowledge graph., , , , , , , , and . J. Intell. Fuzzy Syst., 43 (6): 8195-8206 (2022)A DNS Tunnel Sliding Window Differential Detection Method Based on Normal Distribution Reasonable Range Filtering., , , , , , and . CoRR, (2022)An Approximate Flow Betweenness Centrality Measure for Complex Network., , , , and . IEICE Trans. Inf. Syst., 96-D (3): 727-730 (2013)Reversible Data Hiding for BTC-Compressed Images Based on Lossless Coding of Mean Tables., , , and . IEICE Trans. Commun., 96-B (2): 624-631 (2013)Deep learning-based personality recognition from text posts of online social networks., , , , , , , and . Appl. Intell., 48 (11): 4232-4246 (2018)An API Semantics-Aware Malware Detection Method Based on Deep Learning., , , , , and . Secur. Commun. Networks, (2019)A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES., , , , , , and . Comput. Secur., (2013)pbSE: Phase-Based Symbolic Execution., , , , , , and . DSN, page 133-144. IEEE Computer Society, (2017)Random Walks on Stochastic and Deterministic Small-World Networks., , , , and . IEICE Trans. Inf. Syst., 96-D (5): 1215-1218 (2013)