Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Toeplitz MDS Matrices., and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 3-18. Springer, (2017)PHyCT : Privacy preserving Hybrid Contact Tracing., and . IACR Cryptol. ePrint Arch., (2020)On affine (non)equivalence of Boolean functions., , , and . Computing, 85 (1-2): 37-55 (2009)Proofs of Retrievability via Fountain Code., and . FPS, volume 7743 of Lecture Notes in Computer Science, page 18-32. Springer, (2012)DEFAULT: Cipher Level Resistance Against Differential Fault Attack., , , , , , and . ASIACRYPT (2), volume 13091 of Lecture Notes in Computer Science, page 124-156. Springer, (2021)Initial results on the rotation symmetric bent-negabent functions., and . IWSDA, page 80-84. IEEE, (2015)On the Lower Bounds of the Second Order Nonlinearity of some Boolean Functions., , and . IACR Cryptology ePrint Archive, (2009)A Deeper Understanding of the XOR Count Distribution in the Context of Lightweight Cryptography., and . AFRICACRYPT, volume 9646 of Lecture Notes in Computer Science, page 167-182. Springer, (2016)MaRSChain: Framework for a Fair Manuscript Review System Based on Permissioned Blockchain., , and . Euro-Par Workshops, volume 11339 of Lecture Notes in Computer Science, page 355-366. Springer, (2018)Construction of Rotation Symmetric Boolean Functions on Odd Number of Variables with Maximum Algebraic Immunity., and . AAECC, volume 4851 of Lecture Notes in Computer Science, page 271-280. Springer, (2007)