Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating Both Data Corruption and Content Replay Attacks with Implicit Data Integrity.. ISCC, page 1-7. IEEE, (2019)A Survey of Programmable Networks, , , , , and . ACM Computer Communications Review, 29 (2): 7-23 (April 1999)Programming Internet Quality of Service., , , , and . USM, volume 1890 of Lecture Notes in Computer Science, page 106-123. Springer, (2000)There is No Need to Waste Communication Bandwidth on MACs., , , , , and . GIIS, page 1-7. IEEE, (2018)Efficient implementation of the Galois Counter Mode using a carry-less multiplier and a fast reduction algorithm., and . Inf. Process. Lett., 110 (14-15): 549-553 (2010)Vortex: A New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication., and . IACR Cryptology ePrint Archive, (2008)The object class intrinsic filter conjecture.. IJCNN, page 3846-3853. IEEE, (2017)Κ-Cipher: A Low Latency, Bit Length Parameterizable Cipher., , , and . IACR Cryptology ePrint Archive, (2020)Security definitions, entropy measures and constructions for implicitly detecting data corruption., , , and . Comput. Commun., (2020)Mitigating collision and preimage attacks against the generalized MDC-2 mode of operation., and . ISCC, page 196-201. IEEE Computer Society, (2010)