Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algebraic analysis of Trivium and Trivium/128., and . Int. J. Electron. Secur. Digit. Forensics, 1 (4): 344-352 (2008)FBASHI: Fuzzy and Blockchain-Based Adaptive Security for Healthcare IoTs., , , , , , , and . IEEE Access, (2022)The Reality of Backdoored S-Boxes - An Eye Opener., , , , and . IACR Cryptol. ePrint Arch., (2023)A Compact S-Box Design for SMS4 Block Cipher., and . IACR Cryptology ePrint Archive, (2011)Enhanced Metamorphic Techniques-A Case Study Against Havex Malware., , , , and . IEEE Access, (2021)Algebraic Side Channel Attack on Trivium and Grain Ciphers., , , , and . IEEE Access, (2017)Detection of non-trivial preservable quotient spaces in S-Box(es)., , , , and . Neural Comput. Appl., 35 (25): 18343-18355 (September 2023)A game model design using test bed for Malware analysis training., , and . Inf. Comput. Secur., 30 (4): 633-650 (2022)A systematic threat analysis and defense strategies for the metaverse and extended reality systems., , and . Comput. Secur., (May 2023)On the Efficiency of Software Implementations of Lightweight Block Ciphers from the Perspective of Programming Languages., , , , and . IACR Cryptology ePrint Archive, (2019)