From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimized IoT Cryptoprocessor Based on QC-MPDC Key Encapsulation Mechanism., , , , , и . IEEE Internet Things J., 7 (9): 8513-8524 (2020)Notions and relations for RKA-secure permutation and function families., , , , и . Des. Codes Cryptogr., 60 (1): 15-35 (2011)Tuple Cryptanalysis: Slicing and Fusing Multisets., и . Mycrypt, том 10311 из Lecture Notes in Computer Science, стр. 294-320. Springer, (2016)Eulerian emotion magnification for subtle expression recognition., , , и . ICASSP, стр. 1243-1247. IEEE, (2016)Reducing the exhaustive key search of the Data Encryption Standard (DES).. Comput. Stand. Interfaces, 29 (5): 528-530 (2007)Cryptanalysis of a New Ultralightweight RFID Authentication Protocol—SASI.. IEEE Trans. Dependable Secur. Comput., 6 (4): 316-320 (2009)AdverFacial: Privacy-Preserving Universal Adversarial Perturbation Against Facial Micro-Expression Leakages., , , и . ICASSP, стр. 2754-2758. IEEE, (2022)On the Analysis and Design of a Family Tree of Smart Card Based User Authentication Schemes., и . UIC, том 4611 из Lecture Notes in Computer Science, стр. 1213-1221. Springer, (2007)Multimodal decomposition with magnification on micro-expressions and its impact on facial biometric recognition., , , и . ISCE, стр. 45-46. IEEE, (2017)How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?., и . AFRICACRYPT, том 5023 из Lecture Notes in Computer Science, стр. 308-324. Springer, (2008)