Author of the publication

Primitive polynomials for robust scramblers and stream ciphers against reverse engineering.

, , and . ISIT, page 2473-2477. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Framework for Software Defined Wireless Body Area Network., , , and . CoRR, (2019)Specification and Validation of Enhanced Mobile Agent-Enabled Anomaly Detection and Verification in Resource Constrained Networks., , and . J. Networks, 10 (6): 353-368 (2015)Coordinates and Bearing of Submerged Sensors Using a Single Mobile Beacon (CSMB)., , and . J. Networks, 10 (8): 462-469 (2015)Primitive polynomials for robust linear feedback shift registers-based scramblers and stream ciphers., , , and . IET Inf. Secur., 6 (3): 183-189 (2012)New code equivalence based on relative generalized Hamming weights., , , and . Inf. Sci., 181 (19): 4309-4317 (2011)SP-CIDS: Secure and Private Collaborative IDS for VANETs., , , , , and . IEEE Trans. Intell. Transp. Syst., 22 (7): 4385-4393 (2021)Foreword - Special Issue: Codes, Cryptology and Curves in honour of Ruud Pellikaan., , , and . Des. Codes Cryptogr., 88 (8): 1477-1478 (2020)A multipath routing protocol for secure energy efficient communication in Wireless Sensor Networks., , , , and . Comput. Networks, (August 2023)Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic., , and . IEEE Trans. Consumer Electron., 61 (2): 197-205 (2015)On the Security of Permutation-Only Image Encryption Schemes., , and . IEEE Trans. Inf. Forensics Secur., 11 (2): 235-246 (2016)