Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton., , and . IACR Cryptology ePrint Archive, (2013)Efficient Certificateless Signcryption in the Standard Model: Revisiting Luo and Wan's Scheme from Wireless Personal Communications (2018)., , and . Comput. J., 62 (8): 1178-1193 (2019)New secure channel coding scheme based on randomly punctured quasi-cyclic-low density parity check codes., , and . IET Commun., 8 (14): 2556-2562 (2014)Biclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers., , and . Secur. Commun. Networks, 9 (1): 27-33 (2016)Impossible Differential Attacks on 13-Round CLEFIA-128., , and . J. Comput. Sci. Technol., 26 (4): 744-750 (2011)Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks., , and . ISC Int. J. Inf. Secur., (October 2023)On computational complexity of impossible differential cryptanalysis., , and . Inf. Process. Lett., 114 (5): 252-255 (2014)Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions., , , and . J. Cryptol., 28 (2): 240-256 (2015)Non-isomorphic biclique cryptanalysis of full-round Crypton., , and . Comput. Stand. Interfaces, (2015)New Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-128., , , and . Selected Areas in Cryptography, volume 5867 of Lecture Notes in Computer Science, page 281-294. Springer, (2009)