From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

High throughput fault-resilient AES architecture., , и . IET Comput. Digit. Tech., 13 (4): 312-323 (2019)CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking., , и . ISC Int. J. Inf. Secur., 12 (2): 67-80 (2020)Improved zero-correlation and impossible differential cryptanalysis of reduced-round SIMECK block cipher., и . IET Inf. Secur., 12 (4): 314-325 (2018)Cryptanalysis of a new EPC class-1 generation-2 standard compliant RFID protocol., , и . Neural Comput. Appl., 24 (3-4): 799-805 (2014)Proposing an MILP-based Method for the Experimental Verification of Difference Trails., , и . IACR Cryptol. ePrint Arch., (2020)On the (im)possibility of receiving security beyond 2l using an l-bit PRNG: the case of Wang et. al. protocol., , , , и . IACR Cryptol. ePrint Arch., (2015)On Designing Lightweight RFID Security Protocols for Medical IoT., , , и . IACR Cryptology ePrint Archive, (2019)Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives., , , , , и . ISeCure, 11 (1): 35-46 (2019)Relaxed Differential Fault Analysis of SHA-3., , и . ISeCure, 11 (2): 129-143 (2019)Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI+ protocols., и . IACR Cryptology ePrint Archive, (2016)