Author of the publication

Primitive polynomials for robust linear feedback shift registers-based scramblers and stream ciphers.

, , , and . IET Inf. Secur., 6 (3): 183-189 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Framework for Software Defined Wireless Body Area Network., , , and . CoRR, (2019)Specification and Validation of Enhanced Mobile Agent-Enabled Anomaly Detection and Verification in Resource Constrained Networks., , and . J. Networks, 10 (6): 353-368 (2015)Coordinates and Bearing of Submerged Sensors Using a Single Mobile Beacon (CSMB)., , and . J. Networks, 10 (8): 462-469 (2015)Primitive polynomials for robust linear feedback shift registers-based scramblers and stream ciphers., , , and . IET Inf. Secur., 6 (3): 183-189 (2012)On the Security of Permutation-Only Image Encryption Schemes., , and . IEEE Trans. Inf. Forensics Secur., 11 (2): 235-246 (2016)SP-CIDS: Secure and Private Collaborative IDS for VANETs., , , , , and . IEEE Trans. Intell. Transp. Syst., 22 (7): 4385-4393 (2021)A multipath routing protocol for secure energy efficient communication in Wireless Sensor Networks., , , , and . Comput. Networks, (August 2023)New code equivalence based on relative generalized Hamming weights., , , and . Inf. Sci., 181 (19): 4309-4317 (2011)Foreword - Special Issue: Codes, Cryptology and Curves in honour of Ruud Pellikaan., , , and . Des. Codes Cryptogr., 88 (8): 1477-1478 (2020)Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic., , and . IEEE Trans. Consumer Electron., 61 (2): 197-205 (2015)