Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources: When the Adversaries Have Access to the History Outputs., , , , , and . TrustCom/BigDataSE, page 152-159. IEEE, (2019)On the provable security of TPM2.0 cryptography APIs., and . Int. J. Embed. Syst., 7 (3/4): 230-243 (2015)Computing Walsh coefficients from the algebraic normal form of a Boolean function., , , and . Cryptogr. Commun., 6 (4): 335-358 (2014)Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient., , , , and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 343-356. Springer, (2003)Multiple Privacy Regimes Mechanism for Local Differential Privacy., , , , and . DASFAA (2), volume 11447 of Lecture Notes in Computer Science, page 247-263. Springer, (2019)Distributed Oblivious Function Evaluation and Its Applications., , , and . J. Comput. Sci. Technol., 19 (6): 942-947 (2004)Construct MD5 Collisions Using Just A Single Block Of Message., and . IACR Cryptology ePrint Archive, (2010)On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption., , , and . IACR Cryptology ePrint Archive, (2013)Analysis and Design of E-voting Protocol., , and . SEC, volume 175 of IFIP Conference Proceedings, page 281-290. Kluwer, (2000)FARB: Fast Anonymous Reputation-Based Blacklisting without TTPs., and . WPES, page 139-148. ACM, (2014)