Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementation and Evaluation of an Identity-Based Encryption with Security Against the KGC., , , and . CANDAR (Workshops), page 320-325. IEEE, (2021)Output Prediction Attacks on Block Ciphers Using Deep Learning., , , , , and . ACNS Workshops, volume 13285 of Lecture Notes in Computer Science, page 248-276. Springer, (2022)Slide Property of RAKAPOSHI and Its Application to Key Recovery Attack., , and . Inf. Media Technol., 8 (4): 987-994 (2013)A Generic Construction of Integrated Secure-Channel Free PEKS and PKE., , and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 69-86. Springer, (2018)Detecting Fake QR Codes Using Information from Error-Correction., , , , , , , , , and 2 other author(s). J. Inf. Process., (2021)Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations., , , and . Comput. J., 62 (4): 614-630 (2019)FMS Attack-Resistant WEP Implementation Is Still Broken., , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 17-26. Springer, (2005)Neural-Network-Based Pseudo-Random Number Generator Evaluation Tool for Stream Ciphers., , and . CANDAR Workshops, page 333-338. IEEE, (2019)Supporting USB Devices for the Global Migration., , , , , and . SAINT, page 153-156. IEEE Computer Society, (2010)Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI., , and . IWSEC, volume 7631 of Lecture Notes in Computer Science, page 138-155. Springer, (2012)