Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations., and . Theor. Comput. Sci., (2021)Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property., , and . Comput. Stand. Interfaces, (January 2024)A New Improved AES S-box with Enhanced Properties., , and . ACISP, volume 12248 of Lecture Notes in Computer Science, page 125-141. Springer, (2020)A QR Code Watermarking Approach Based on the DWT-DCT Technique., , , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 314-331. Springer, (2017)Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search., , , , , and . ProvSec, volume 11821 of Lecture Notes in Computer Science, page 113-129. Springer, (2019)A generalised bound for the Wiener attack on RSA., , and . J. Inf. Secur. Appl., (2020)Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems., , , , , and . IEEE Trans. Parallel Distributed Syst., 32 (3): 561-574 (2021)A new attack on some RSA variants., , and . Theor. Comput. Sci., (June 2023)Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem., , and . ProvSec, volume 11821 of Lecture Notes in Computer Science, page 206-221. Springer, (2019)A generalized attack on RSA type cryptosystems., , , and . Theor. Comput. Sci., (2017)