Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the evolution of bent (n, m) functions., , and . CEC, page 2137-2144. IEEE, (2017)Analyzing gene expression data: Fuzzy decision tree algorithm applied to the classification of cancer data., , and . FUZZ-IEEE, page 1-8. IEEE, (2015)Cellular automata based S-boxes., , , and . Cryptogr. Commun., 11 (1): 41-62 (2019)On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box., , , , , and . CS2@HiPEAC, page 13-18. ACM, (2014)Bent Functions from Cellular Automata., , and . IACR Cryptol. ePrint Arch., (2020)Improving DPA resistance of S-boxes: How far can we go?, , , and . ISCAS, page 2013-2016. IEEE, (2015)On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials., and . IACR Cryptology ePrint Archive, (2017)Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?, , , and . IACR Cryptology ePrint Archive, (2017)Profiled SCA with a New Twist: Semi-supervised Learning., , , , and . IACR Cryptology ePrint Archive, (2017)When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis., , , and . IACR Cryptology ePrint Archive, (2018)