Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Linear Cryptanalysis of Round Reduced SIMON., , , , , and . IACR Cryptol. ePrint Arch., (2014)Enhancing Mutual Trustworthiness in Federated Learning for Data-Rich Smart Cities., , , , , , , and . CoRR, (2024)Cryptanalysis of the SIMON Family of Block Ciphers., and . IACR Cryptol. ePrint Arch., (2013)MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors., , and . WISEC, page 53-64. ACM, (2020)Cryptanalysis of SIMON Variants with Connections., , , , , , , and . RFIDSec, volume 8651 of Lecture Notes in Computer Science, page 90-107. Springer, (2014)Side Channel Analysis of SPARX-64/128: Cryptanalysis and Countermeasures., and . AFRICACRYPT, volume 11627 of Lecture Notes in Computer Science, page 352-369. Springer, (2019)FIMBA: Evaluating the Robustness of AI in Genomics via Feature Importance Adversarial Attacks., and . CoRR, (2024)Cryptanalysis of 1-Round KECCAK., , and . IACR Cryptol. ePrint Arch., (2017)Towards Mutual Trust-Based Matching For Federated Learning Client Selection., , , , , and . IWCMC, page 1112-1117. IEEE, (2023)Cryptanalysis of 1-Round KECCAK., , and . AFRICACRYPT, volume 10831 of Lecture Notes in Computer Science, page 124-137. Springer, (2018)