Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On massive MIMO physical layer cryptosystem., and . ITW Fall, page 292-296. IEEE, (2015)Practical MP-LWE-based encryption balancing security-risk vs. efficiency., , and . IACR Cryptology ePrint Archive, (2019)Steepest Gradient-Based Orthogonal Precoder For Integer-Forcing MIMO., , , and . CoRR, (2019)Implementation of a two-way relay network with compute-and-forward in GNU Radio., , and . Trans. Emerg. Telecommun. Technol., 27 (4): 484-493 (2016)Incremental symmetric puncturable encryption with support for unbounded number of punctures., , and . Des. Codes Cryptogr., 91 (4): 1401-1426 (April 2023)Practical $$MP - LWE $$ -based encryption balancing security-risk versus efficiency., , and . Des. Codes Cryptogr., 87 (12): 2847-2884 (2019)Ambiguity and Deficiency of Permutations Over Finite Fields With Linearized Difference Map., , , , and . IEEE Trans. Inf. Theory, 59 (9): 5616-5626 (2013)Cycle structure of permutation functions over finite fields and their applications., , and . Adv. Math. Commun., 6 (3): 347-361 (2012)Practical Post-quantum Few-Time Verifiable Random Function with Applications to Algorand., , , , , , and . Financial Cryptography (2), volume 12675 of Lecture Notes in Computer Science, page 560-578. Springer, (2021)A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics., , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 66-85. Springer, (2022)