Author of the publication

MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems.

, , , , and . IACR Cryptology ePrint Archive, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DSSH: Digital signature based secure handover for network-based mobility management., , and . Comput. Syst. Sci. Eng., (2012)A Framework for the User-Oriented Personal Information Protection., and . Security and Management, page 12-19. CSREA Press, (2006)Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters., , , , , and . IACR Cryptology ePrint Archive, (2015)An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency., , , , and . IACR Cryptology ePrint Archive, (2014)A new security middleware architecture based on fog computing and cloud to support IoT constrained devices., , and . IML, page 35:1-35:8. ACM, (2017)Cyberbullying detection using parent-child relationship between comments., , , and . iiWAS, page 325-334. ACM, (2016)Modeling and Containment of Search Worms Targeting Web Applications., and . DIMVA, volume 6201 of Lecture Notes in Computer Science, page 183-199. Springer, (2010)Implementation of Efficient Operations over GF(232) Using Graphics Processing Units., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 602-611. Springer, (2014)Single-Path Authenticated-Encryption Scheme Based on Universal Hashing., and . Selected Areas in Cryptography, volume 2595 of Lecture Notes in Computer Science, page 94-109. Springer, (2002)A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks., , and . WISA, volume 10144 of Lecture Notes in Computer Science, page 79-89. (2016)