Author of the publication

Detection of non-trivial preservable quotient spaces in S-Box(es).

, , , , and . Neural Comput. Appl., 35 (25): 18343-18355 (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced Metamorphic Techniques-A Case Study Against Havex Malware., , , , and . IEEE Access, (2021)Revolutionizing Data Center Networks: Dynamic Load Balancing via Floodlight in SDN Environment., , , , , , , and . ICACS, page 1-8. IEEE, (2024)Hand-based multibiometric systems: state-of-the-art and future challenges., , , , , and . PeerJ Comput. Sci., (2021)A social qualitative trust framework for Fog computing., , , , and . Comput. Electr. Eng., (2022)Verifiable Privacy-Preserving Image Retrieval in Multi-Owner Multi-User Settings., , and . IEEE Trans. Emerg. Top. Comput. Intell., 8 (2): 1640-1655 (April 2024)Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art., , , , , , , and . Telematics Informatics, 35 (4): 702-726 (2018)Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks., , , , , , and . ACM Comput. Surv., 54 (6): 121:1-121:36 (2022)From trust to truth: Advancements in mitigating the Blockchain Oracle problem., , , , and . J. Netw. Comput. Appl., (2023)The Reality of Backdoored S-Boxes - An Eye Opener., , , , and . IACR Cryptol. ePrint Arch., (2023)An Efficient and Secure Revocation-Enabled Attribute-Based Access Control for eHealth in Smart Society., , , , , , and . Sensors, 22 (1): 336 (2022)