Author of the publication

Tight Security Bounds for Key-Alternating Ciphers.

, and . EUROCRYPT, volume 8441 of Lecture Notes in Computer Science, page 327-350. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Carryable and automatically balanced intravenous drip frame and using method thereof., , , and . WOCC, page 1-2. IEEE, (2018)Arc-transitive Cayley graphs on nonabelian simple groups with prime valency., , , and . J. Comb. Theory A, (2021)Fast online classification of network traffic using new feature-embedded hierarchical structure., , , , , and . Comput. Networks, (December 2023)Semi-supervised ranking SVM-assisted IGA with hierarchical evaluations., , and . IEEE Congress on Evolutionary Computation, page 1-8. IEEE, (2012)Profiling System., , , and . IKE, page 266-274. CSREA Press, (2004)Privacy in Social Networks: a Comparative Study., and . PACIS, page 81. AISeL, (2009)Thinkey: A Scalable Blockchain Architecture., , , , , , , and . CoRR, (2019)Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC., , , , and . ESORICS (1), volume 11735 of Lecture Notes in Computer Science, page 404-426. Springer, (2019)A Novel Edge Effect Detection Method for Real-Time Cellular Analyzer Using Functional Principal Component Analysis., , , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 17 (5): 1563-1572 (2020)Model predictive current control combined sliding mode speed control for PMSM drive system., , and . Int. J. Model. Identif. Control., 36 (4): 297-303 (2020)