Author of the publication

Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network.

, , , , , , and . Int. J. Comput. Intell. Syst., 5 (5): 896-904 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification of novel PI3Kδ inhibitors by docking, ADMET prediction and molecular dynamics simulations., , , , , and . Comput. Biol. Chem., (2019)Identification of novel PPARα/γ dual agonists by pharmacophore screening, docking analysis, ADMET prediction and molecular dynamics simulations., , , , , , and . Comput. Biol. Chem., (2019)Improved Impossible Differential Attack on Reduced Version of Camellia-192/256., , , and . IACR Cryptology ePrint Archive, (2012)Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256., , , , and . IACR Cryptology ePrint Archive, (2011)Path optimization algorithm for agents based on artificial immune and emotional learning., , , and . ICCA, page 247-251. IEEE, (2010)Ciphertext-only fault analysis of GIFT lightweight cryptosystem., , , , , , , , and . Sci. China Inf. Sci., (2022)Efficient and Secure Certificateless Proxy Re-Encryption., , and . KSII Trans. Internet Inf. Syst., 11 (4): 2254-2275 (2017)Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things., , , , , , and . KSII Trans. Internet Inf. Syst., 9 (2): 793-810 (2015)Two heuristics for the capacitated multi-period cutting stock problem with pattern setup cost., , and . Comput. Oper. Res., (2019)Time-Varying Formation Planning and Scaling Control for Tethered Space Net Robot., , , and . IEEE Trans. Aerosp. Electron. Syst., 59 (5): 6717-6728 (October 2023)