Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nonlinearity of Boolean Functions: An Algorithmic Approach Based on Multivariate Polynomials., , and . Symmetry, 14 (2): 213 (2022)A Cipher-Agnostic Neural Training Pipeline with Automated Finding of Good Input Differences., , , and . IACR Trans. Symmetric Cryptol., 2023 (3): 184-212 (2023)Statistical Tests for Symmetric Primitives - An Application to NIST Lightweight Finalists., , and . SecITC, volume 13809 of Lecture Notes in Computer Science, page 133-152. Springer, (2022)Blockchain-Based Trustworthy O2O Interaction in the Next 6G Ecosystem., , and . CSR, page 92-98. IEEE, (2023)A Blockchain-based Trustworthy Cloud Services Digital Ecosystem., , , and . CSR, page 118-124. IEEE, (2022)Resilience learning through self adaptation in digital twins of human-cyber-physical systems., , , , , , , and . CSR, page 168-173. IEEE, (2021)An Intelligent Platform for Threat Assessment and Cyber-Attack Mitigation in IoMT Ecosystems., , , and . GLOBECOM (Workshops), page 541-546. IEEE, (2022)An Estimator for the Hardness of the MQ Problem., , , and . AFRICACRYPT, volume 13503 of Lecture Notes in Computer Science, page 323-347. Springer Nature Switzerland, (2022)Parallel Isogeny Path Finding with Limited Memory., , , , , , , , and . INDOCRYPT, volume 13774 of Lecture Notes in Computer Science, page 294-316. Springer, (2022)SoK: CryptographicEstimators - a Software Library for Cryptographic Hardness Estimation., , , and . AsiaCCS, ACM, (2024)