Author of the publication

A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers.

, , , , , , and . IEEE Trans. Inf. Forensics Secur., 11 (5): 1039-1054 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strength-Strength and Strength-Degree Correlation Measures for Directed Weighted Complex Network Analysis., , , and . IEICE Trans. Inf. Syst., 94-D (11): 2284-2287 (2011)A DNS Tunnel Sliding Window Differential Detection Method Based on Normal Distribution Reasonable Range Filtering., , , , , , and . CoRR, (2022)An Approximate Flow Betweenness Centrality Measure for Complex Network., , , , and . IEICE Trans. Inf. Syst., 96-D (3): 727-730 (2013)Reversible Data Hiding for BTC-Compressed Images Based on Lossless Coding of Mean Tables., , , and . IEICE Trans. Commun., 96-B (2): 624-631 (2013)A unified semantic description and user's permissions knowledge reasoning for multiple domain cyberspace based on knowledge graph., , , , , , , , and . J. Intell. Fuzzy Syst., 43 (6): 8195-8206 (2022)Deep learning-based personality recognition from text posts of online social networks., , , , , , , and . Appl. Intell., 48 (11): 4232-4246 (2018)An API Semantics-Aware Malware Detection Method Based on Deep Learning., , , , , and . Secur. Commun. Networks, (2019)A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES., , , , , , and . Comput. Secur., (2013)pbSE: Phase-Based Symbolic Execution., , , , , , and . DSN, page 133-144. IEEE Computer Society, (2017)Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher., , and . IACR Cryptology ePrint Archive, (2011)