From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A modification proposal for the reconciliation mechanism of the key exchange algorithm NewHope., , и . Log. J. IGPL, 30 (6): 1028-1040 (2022)Study of the Reconciliation Mechanism of NewHope., , и . CISIS, том 1267 из Advances in Intelligent Systems and Computing, стр. 361-370. Springer, (2020)Secure Elliptic Curves in Cryptography., , и . Computer and Network Security Essentials, Springer, (2018)A Lightweight Pseudorandom Number Generator for Securing the Internet of Things., , , и . IEEE Access, (2017)Comparing low and medium cost computer-based technologies suitable for cryptographic attacks., , , и . Log. J. IGPL, 27 (2): 177-188 (2019)A Toolbox for DPA Attacks to Smart Cards., , , и . SOCO-CISIS-ICEUTE, том 239 из Advances in Intelligent Systems and Computing, стр. 399-408. Springer, (2013)A Comparison of Computer-Based Technologies Suitable for Cryptographic Attacks., , , , и . SOCO-CISIS-ICEUTE, том 527 из Advances in Intelligent Systems and Computing, стр. 621-630. (2016)State of the Art of Cybersecurity in Cooperative, Connected and Automated Mobility., , , , и . CISIS-ICEUTE, том 532 из Lecture Notes in Networks and Systems, стр. 104-113. Springer, (2022)Identification by means of a national ID card for wireless services., , , и . WPMC, стр. 1-5. IEEE, (2013)A Proposal for Using a Cryptographic National Identity Card in Social Networks., , , и . SOCO-CISIS-ICEUTE, том 649 из Advances in Intelligent Systems and Computing, стр. 651-660. Springer, (2017)