Author of the publication

Evaluating the indistinguishability of the XTS mode in the proposed security model.

, and . IACR Cryptology ePrint Archive, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unsupervised Anomaly Detection in Online Game., , , , , and . SoICT, page 4-10. ACM, (2015)MRF-based adaptive detection approach: a framework for restoring image degraded by Gaussian noise., , and . RACS, page 152-156. ACM, (2013)Beyond Indoor Presence Monitoring with Simple Sensors., and . PECCS, page 5-14. SciTePress, (2012)Evaluating the indistinguishability of the XTS mode in the proposed security model., and . IACR Cryptology ePrint Archive, (2018)RFL-IoT: An IoT Reconfiguration Framework Applied Fuzzy Logic for Context Management., and . RIVF, page 1-6. IEEE, (2019)Caching and Containerization of IP Address Allocation Process in 5G Core Networks for Performance Improvements., , , , and . IMCOM, page 1-8. IEEE, (2023)Refining Incomplete Planning Domain Models Through Plan Traces., , and . IJCAI, page 2451-2458. IJCAI/AAAI, (2013)Divide-and-Conquer Approach for Multi-phase Statistical Migration for Source Code (T)., , and . ASE, page 585-596. IEEE Computer Society, (2015)Scalable Distributed Random Number Generation Based on Homomorphic Encryption., , , , , , and . Blockchain, page 572-579. IEEE, (2019)Exploring API embedding for API usages and applications., , , and . ICSE, page 438-449. IEEE / ACM, (2017)