Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improvements in the computing efficiency of the probabilities of the LIL test for the PRNG evaluation., , , , and . Theor. Comput. Sci., (2022)Measuring Independence between Statistical Randomness Tests by Mutual Information., , , , and . Entropy, 22 (7): 741 (2020)Local Search Trajectories over S-box space., , , , and . J. Inf. Secur. Appl., (2022)Detection of DIAG and LINE Patterns in PassPoints Graphical Passwords Based on the Maximum Angles of Their Delaunay Triangles., , , , and . Sensors, 22 (5): 1987 (2022)Improved Objective Functions to Search for 8 × 8 Bijective S-Boxes With Theoretical Resistance Against Power Attacks Under Hamming Leakage Models., , , , and . IEEE Access, (2022)Information Theory Based Evaluation of the RC4 Stream Cipher Outputs., , , and . Entropy, 23 (7): 896 (2021)Evolving Nonlinear S-Boxes With Improved Theoretical Resilience to Power Attacks., , , , and . IEEE Access, (2020)Test for Detection of Weak Graphic Passwords in Passpoint Based on the Mean Distance between Points., , , , , and . Symmetry, 13 (5): 777 (2021)Probabilistic Evaluation of the Exploration-Exploitation Balance during the Search, Using the Swap Operator, for Nonlinear Bijective S-Boxes, Resistant to Power Attacks., , , , , and . Inf., 12 (12): 509 (2021)Selecting an Effective Entropy Estimator for Short Sequences of Bits and Bytes with Maximum Entropy., , , , and . Entropy, 23 (5): 561 (2021)