Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents., , , and . Wireless Personal Communications, 56 (1): 73-83 (2011)High speed implementation of symmetric block cipher on GPU., , , and . ISPACS, page 102-107. IEEE, (2014)Security and Privacy Preservation in Human-Involved Networks., , and . iNetSeC, volume 309 of IFIP Advances in Information and Communication Technology, page 139-148. Springer, (2009)Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords., and . ACNS, volume 3989 of Lecture Notes in Computer Science, page 226-238. (2006)A Cryptanalytic View of the NSA's Skipjack Block Cipher Design., and . ISA, volume 5576 of Lecture Notes in Computer Science, page 368-381. Springer, (2009)Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks., , and . AFRICACRYPT, volume 5580 of Lecture Notes in Computer Science, page 60-76. Springer, (2009)On the Security of a Hybrid SVD-DCT Watermarking Method Based on LPSNR., , and . PSIVT (1), volume 7087 of Lecture Notes in Computer Science, page 257-266. Springer, (2011)On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences., , and . WISA, volume 4867 of Lecture Notes in Computer Science, page 245-265. Springer, (2007)Energy-Efficient Cryptographic Engineering Paradigm., and . iNetSeC, volume 7039 of Lecture Notes in Computer Science, page 78-88. Springer, (2011)Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis., and . CARDIS, volume 3928 of Lecture Notes in Computer Science, page 135-150. Springer, (2006)