Author of the publication

Protection of Integrity and Ownership of PDF Documents Using Invisible Signature.

, , , and . UKSim, page 533-537. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Twin Column Parity Mixers and Gaston - A New Mixing Layer and Permutation., , , and . CRYPTO (3), volume 14083 of Lecture Notes in Computer Science, page 475-506. Springer, (2023)Solving a Binary Puzzle., and . Math. Comput. Sci., 11 (3-4): 515-526 (2017)An Estimator for the Hardness of the MQ Problem., , , and . AFRICACRYPT, volume 13503 of Lecture Notes in Computer Science, page 323-347. Springer Nature Switzerland, (2022)Relating Undisturbed Bits to Other Properties of Substitution Boxes., and . LightSec, volume 8898 of Lecture Notes in Computer Science, page 109-125. Springer, (2014)CLAASP: A Cryptographic Library for the Automated Analysis of Symmetric Primitives., , , , , , and . SAC, volume 14201 of Lecture Notes in Computer Science, page 387-408. Springer, (2023)New Records of Pre-image Search of Reduced SHA-1 Using SAT Solvers., , , , , and . ICMC, volume 1412 of Advances in Intelligent Systems and Computing, page 141-151. Springer, (2021)Protection of Integrity and Ownership of PDF Documents Using Invisible Signature., , , and . UKSim, page 533-537. IEEE Computer Society, (2012)Fully Automated Differential-Linear Attacks Against ARX Ciphers., , , , and . CT-RSA, volume 13871 of Lecture Notes in Computer Science, page 252-276. Springer, (2023)Advances and Challenges of Rank Metric Cryptography Implementations., , , , , and . ICCD, page 325-328. IEEE, (2019)M4GB: An Efficient Gröbner-Basis Algorithm., and . ISSAC, page 293-300. ACM, (2017)