Author of the publication

Hardware Implementation of Rainbow Tables Generation for Hash Function Cryptanalysis.

, , , , , and . ISAT (2), volume 430 of Advances in Intelligent Systems and Computing, page 189-200. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

StegFog: Distributed Steganography Applied to Cyber Resiliency in Multi Node Environments., , and . IEEE Access, (2022)Yet Another Network Steganography Technique Basedon TCP Retransmissions., and . ICFSP, page 35-39. IEEE, (2019)5G-Enabled Defence-in-Depth for Multi-domain Operations., , , and . MILCOM, page 1024-1029. IEEE, (2022)SocialStegDisc: Application of steganography in social networks to create a file system., and . ICFSP, page 76-80. IEEE, (2017)Towards Empowering Cyber Attack Resiliency Using Steganography., and . ICFSP, page 24-28. IEEE, (2018)Mobile Agents for Detecting Network Attacks Using Timing Covert Channels., , , and . J. Univers. Comput. Sci., 25 (9): 1109-1130 (2019)Methods for Information Hiding in Open Social Networks., and . J. Univers. Comput. Sci., 25 (2): 74-97 (2019)Hardware Implementation of Rainbow Tables Generation for Hash Function Cryptanalysis., , , , , and . ISAT (2), volume 430 of Advances in Intelligent Systems and Computing, page 189-200. Springer, (2015)Application of Perfectly Undetectable Network Steganography Method for Malware Hidden Communication., , , and . ICFSP, page 34-38. IEEE, (2018)Towards model-based anomaly detection in network communication protocols., , , and . ICFSP, page 126-130. IEEE, (2016)