Author of the publication

Minimizing the Two-Round Even-Mansour Cipher.

, , , , and . CRYPTO (1), volume 8616 of Lecture Notes in Computer Science, page 39-56. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Carryable Intravenous Drip Frame with Automatic Balancing., , , , , and . Sensors, 20 (3): 793 (2020)Carryable and automatically balanced intravenous drip frame and using method thereof., , , and . WOCC, page 1-2. IEEE, (2018)Fast online classification of network traffic using new feature-embedded hierarchical structure., , , , , and . Comput. Networks, (December 2023)Arc-transitive Cayley graphs on nonabelian simple groups with prime valency., , , and . J. Comb. Theory, Ser. A, (2021)Semi-supervised ranking SVM-assisted IGA with hierarchical evaluations., , and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2012)Grounding Privacy-by-Design for Information Systems., and . PACIS, page 107. (2013)Tight security bounds for key-alternating ciphers., and . IACR Cryptology ePrint Archive, (2013)Safe device driver model based on kernel-mode JVM., , , and . VTDC@SC, page 3:1-3:8. ACM, (2007)Multi-domain feature analysis for depression: A study of N170 in time, frequency and spatial domains simultaneously., , , , , and . EMBC, page 5986-5989. IEEE, (2013)Tradeoff Between Lifetime and Rate Allocation in Wireless Sensor Networks: A Cross Layer Approach., , , and . INFOCOM, page 267-275. IEEE, (2007)