Author of the publication

S-Boxes, APN Functions and Related Codes.

, and . Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, volume 23 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient binary sequence generator with cryptographic applications., , , and . Appl. Math. Comput., 167 (1): 16-27 (2005)Randomness analysis and generation of key-derived s-boxes., and . Logic Journal of the IGPL, 24 (1): 68-79 (2016)S-Boxes, APN Functions and Related Codes., and . Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, volume 23 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2009)A mesh optimization algorithm based on neural networks., , , and . Inf. Sci., 177 (23): 5347-5364 (2007)Comparing GNG3D and Quadric Error Metrics Methods to Simplify 3D Meshes., , , and . GRAPP, page 99-102. INSTICC Press, (2009)Analysis and design of a secure key exchange scheme., , , and . Inf. Sci., 179 (12): 2014-2021 (2009)A Non-abelian Group Based on Block Upper Triangular Matrices with Cryptographic Applications., , , and . AAECC, volume 5527 of Lecture Notes in Computer Science, page 117-126. Springer, (2009)Cryptographic Applications of 3x3 Block Upper Triangular Matrices., , , and . HAIS (2), volume 7209 of Lecture Notes in Computer Science, page 97-104. Springer, (2012)Optimizing a Password Hashing Function with Hardware-Accelerated Symmetric Encryption., , and . Symmetry, 10 (12): 705 (2018)A Malware Detection Approach Based on Feature Engineering and Behavior Analysis., , and . IEEE Access, (2023)