Author of the publication

Vulnerability Assessment of Ciphers To Fault Attacks Using Reinforcement Learning.

, , , , , and . IACR Cryptol. ePrint Arch., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature., , , and . J. Comput. Networks Commun., (2016)Data User-Based Attribute Based Encryption., , , and . CISS, page 1-5. IEEE, (2020)An Improved Differential Evolution Algorithm for a Multicommodity Location-Inventory Problem with False Failure Returns., , , , and . Complex., (2018)Preliminary Study on Shape Sensing for Continuum Robot Affected by External Load Using Piecewise Fitting Curves., , and . ROBIO, page 2414-2420. IEEE, (2019)Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions., , , , , , and . IACR Cryptol. ePrint Arch., (2020)Correspondence estimation for non-rigid point clouds with automatic part discovery., , and . Vis. Comput., 32 (12): 1511-1524 (2016)基于高阶最小生成树脑网络的多特征融合分类方法 (Multi-feature Fusion Classification Method Based on High-order Minimum Spanning Tree Brain Network)., , and . 计算机科学, 45 (7): 293-298 (2018)A superlinear convergence scheme for nonlinear fractional differential equations and its fast implement., , , and . Int. J. Model. Simul. Sci. Comput., 10 (1): 1941001:1-1941001:16 (2019)Automatic Labanotation Generation Based on Human Motion Capture Data., , , , and . CCPR (1), volume 483 of Communications in Computer and Information Science, page 426-435. Springer, (2014)Multi-continuum manipulators shape reconstruction using inertial navigation sensors and cameras., , , , , , and . Ind. Robot, 48 (3): 401-412 (2021)