Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography., , , , and . Sensors, 18 (5): 1306 (2018)Trade-off between Performance and Security for Coding and Ring Learning With Errors-based Diffie-Hellman Cryptosystems., , and . MetroInd4.0&IoT, page 460-465. IEEE, (2019)iKUP keeps users' privacy in the Smart Grid., and . CNS, page 310-318. IEEE, (2014)Parallel modular exponentiation using load balancing without precomputation., , , and . J. Comput. Syst. Sci., 78 (2): 575-582 (2012)Latin Dances Reloaded: Improved Cryptanalysis Against Salsa and ChaCha, and the Proposal of Forró., , , , , and . ASIACRYPT (1), volume 13791 of Lecture Notes in Computer Science, page 256-286. Springer, (2022)An Efficient One-Bit Model for Differential Fault Analysis on Simon Family., , , and . FDTC, page 61-70. IEEE Computer Society, (2015)The Computer for the 21st Century: Security & Privacy Challenges after 25 Years., , , , , and . ICCCN, page 1-10. IEEE, (2017)The computer for the 21st century: present security & privacy challenges., , , , , , , , and . J. Internet Serv. Appl., 9 (1): 24:1-24:25 (2018)Secure Aggregation Protocol Based on DC-Nets and Secret Sharing for Decentralized Federated Learning., , and . Sensors, 24 (4): 1299 (February 2024)HTTPS Keys in the Mediterranean., , and . MetroInd4.0&IoT, page 449-454. IEEE, (2019)