Author of the publication

Efficient Sequential Architecture of AES CCM for the IEEE 802.16e.

, , and . IEICE Trans. Inf. Syst., 95-D (1): 185-187 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Influence-Balanced Loss for Imbalanced Visual Classification., , , and . ICCV, page 715-724. IEEE, (2021)Covert Channel Detection in the ICMP Payload Using Support Vector Machine., , , , and . ISCIS, volume 2869 of Lecture Notes in Computer Science, page 828-835. Springer, (2003)Classification of Key Management Schemes for Wireless Sensor Networks., , , and . APWeb/WAIM Workshops, volume 4537 of Lecture Notes in Computer Science, page 664-673. Springer, (2007)Modeling and Simulation for Security Risk Propagation in Critical Information Systems., , , , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 858-868. Springer, (2006)Privacy-Enhanced Deniable Authentication E-Mail Service., , , , and . DEIS, volume 194 of Communications in Computer and Information Science, page 16-29. Springer, (2011)A Secure Handover Protocol Design in Wireless Networks with Formal Verification., , , and . WWIC, volume 4517 of Lecture Notes in Computer Science, page 67-78. Springer, (2007)Password-Based Group Key Exchange Secure Against Insider Guessing Attacks., , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 143-148. Springer, (2005)Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98., , , , and . Selected Areas in Cryptography, volume 2595 of Lecture Notes in Computer Science, page 160-174. Springer, (2002)Known-IV Attacks on Triple Modes of Operation of Block Ciphers., , , , , , and . ASIACRYPT, volume 2248 of Lecture Notes in Computer Science, page 208-221. Springer, (2001)Digital evidence collection process in integrity and memory information gathering., , , and . SADFE, page 236-247. IEEE Computer Society, (2005)