Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications., , , , and . IEEE Trans. Veh. Technol., 70 (9): 9306-9319 (2021)Permutation polynomials of the form (xp-x+delta)s+L(x)., , , and . Finite Fields Their Appl., 14 (2): 482-493 (2008)Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD., , , , , and . IEEE Access, (2021)ANS-based compression and encryption with 128-bit security., , , , , , and . Int. J. Inf. Sec., 21 (5): 1051-1067 (2022)On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices., , , , and . IEEE Trans. Inf. Forensics Secur., 10 (8): 1643-1655 (2015)Cube Attacks on Round-Reduced TinyJAMBU., , , , and . IACR Cryptol. ePrint Arch., (2021)Resource-saving quantum key distribution based on three-photon matrix product states., , , and . Quantum Inf. Process., 22 (6): 235 (2023)High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding., , , , , , and . Quantum Inf. Process., 15 (11): 4663-4679 (2016)Signcryption schemes with insider security in an ideal permutation model., , and . J. Math. Cryptol., 13 (2): 117-150 (2019)Tunable multi-party high-capacity quantum key distribution based on m-generalized Fibonacci sequences using golden coding., , , , , and . Quantum Inf. Process., 17 (9): 246 (2018)