Author of the publication

Secretly Pruned Convolutional Codes: Security Analysis and Performance Results.

, , and . IEEE Trans. Inf. Forensics Secur., 11 (7): 1500-1514 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lower Bounds on Sequence Complexity Via Generalised Vandermonde Determinants., , and . SETA, volume 4086 of Lecture Notes in Computer Science, page 271-284. Springer, (2006)Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed-Muller Codes., and . BalkanCryptSec, volume 9540 of Lecture Notes in Computer Science, page 3-16. Springer, (2015)Fast decoding of regular LDPC codes using greedy approximation algorithms., and . ISIT, page 2005-2009. IEEE, (2011)On symplectic matrices of cubic Boolean forms and connections with second order nonlinearity.. ISIT, page 1636-1640. IEEE, (2008)Cryptographic Properties of Stream Ciphers Based on T-functions.. ISIT, page 1604-1608. IEEE, (2006)The Quest for the Appropriate Cyber-threat Intelligence Sharing Platform., , , , , , and . DATA, page 369-376. SciTePress, (2019)A Novel Online Incremental Learning Intrusion Prevention System., , , and . NTMS, page 1-6. IEEE, (2019)A Novel Malware Detection System Based on Machine Learning and Binary Visualization., , and . ICC Workshops, page 1-6. IEEE, (2019)Modifying Boolean Functions to Ensure Maximum Algebraic Immunity., , and . IACR Cryptology ePrint Archive, (2012)Best Quadratic Approximations of Cubic Boolean Functions., , and . IACR Cryptology ePrint Archive, (2007)