Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensitivity and uniformity in statistical randomness tests., , , , and . J. Inf. Secur. Appl., (2022)Critical Analysis of Hypothesis Tests in Federal Information Processing Standard (140-2)., , , , and . Entropy, 24 (5): 613 (2022)Identifying Incentives for Extortion in Proof of Stake Consensus Protocols., , , , and . DBB, volume 541 of Lecture Notes in Networks and Systems, page 109-118. Springer, (2022)Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators., , , , and . ARES, page 105:1-105:11. ACM, (2023)SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks., , and . IEEE Trans. Mob. Comput., 16 (10): 2927-2940 (2017)Investigation into the effects of transmission-channel fidelity loss in RGBD sensor data for SLAM., , and . IWSSIP, page 81-84. IEEE, (2015)Bias in the Mifare DESFire EV1 TRNG., and . RFIDSec, volume 10155 of Lecture Notes in Computer Science, page 123-133. Springer, (2016)Challenges in Certifying Small-Scale (IoT) Hardware Random Number Generators., and . Security of Ubiquitous Computing Systems, Springer International Publishing, (2021)On the Unbearable Lightness of FIPS 140-2 Randomness Tests., , and . IEEE Trans. Inf. Forensics Secur., (2022)Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG., and . IEEE Trans. Inf. Forensics Secur., 13 (4): 1031-1041 (2018)