Author of the publication

Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments.

, , , and . J. Univers. Comput. Sci., 15 (5): 1007-1022 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b., , and . SCN, volume 4116 of Lecture Notes in Computer Science, page 95-110. Springer, (2006)Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing., , , , and . IJDSN, (2014)Cryptanalysis of the XO-64 Suitable for Wireless Systems., , and . Wireless Personal Communications, 93 (2): 589-600 (2017)New Efficient Padding Methods Secure Against Padding Oracle Attacks., , , , , , , and . ICISC, volume 9558 of Lecture Notes in Computer Science, page 329-342. Springer, (2015)Fully decoupled monolithic projection method for natural convection problems., , , and . J. Comput. Phys., (2017)A numerical method for the calculation of drag and lift of a deformable droplet in shear flow., and . J. Comput. Phys., (2013)Efficient monolithic projection method for time-dependent conjugate heat transfer problems., , and . J. Comput. Phys., (2018)Design and analysis of an effective graphics collaborative editing system., , , , , and . EURASIP J. Image Video Process., (2019)Recent advances and future directions in multimedia and mobile computing., , , and . Multim. Tools Appl., 57 (2): 237-242 (2012)A privacy preserving authentication scheme for roaming in ubiquitous networks., , , , and . Clust. Comput., 20 (2): 1223-1236 (2017)