Author of the publication

Efficient methods to generate cryptographically significant binary diffusion layers.

, , , and . IET Inf. Secur., 11 (4): 177-187 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New methods for public key cryptosystems based on XTR., and . Secur. Commun. Networks, 8 (18): 3682-3689 (2015)Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography., , , , and . IET Inf. Secur., 12 (4): 348-355 (2018)A survey of quantum secure group signature schemes: Lattice-based approach., and . J. Inf. Secur. Appl., (March 2023)Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security., , , , and . J. Inf. Secur. Appl., (2021)On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form., , , and . IEEE Access, (2023)Automatic delay-sensitive applications quality of service improvement with deep flows discrimination in software defined networks., , , and . Clust. Comput., 26 (1): 437-459 (February 2023)On the Construction of 4 ˟ 4 Lightweight Involutory MDS Matrices Over $F_2^8$., , , and . ICMC, volume 1412 of Advances in Intelligent Systems and Computing, page 725-736. Springer, (2021)Multiplication in a Galois ring., and . IWSDA, page 28-32. IEEE, (2015)A new lattice-based authentication scheme for IoT., and . J. Inf. Secur. Appl., (2022)A Novel Method for Polar Form of Any Degree of Multivariate Polynomials with Applications in IoT., , , and . Sensors, 19 (4): 903 (2019)