Author of the publication

Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher.

, and . ICISSP, page 622-631. SciTePress, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions, , and . CoRR, (2009)Designs, Intersecting Families, and Weight of Boolean Functions.. IMACC, volume 1746 of Lecture Notes in Computer Science, page 70-80. Springer, (1999)Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language., , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 81-100. Springer, (2009)The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes., , and . J. Comput. Virol. Hacking Tech., 17 (3): 199-220 (2021)Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher., and . ICISSP, page 622-631. SciTePress, (2017)Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity., and . EUROCRYPT, volume 1403 of Lecture Notes in Computer Science, page 475-488. Springer, (1998)Solving a Hard Instance of Suspicious Behaviour Detection with Sparse Binary Vectors Clustering., and . ICISSP, page 635-644. SciTePress, (2019)Optimization of Operational Large-Scale (Cyber) Attacks by a Combinational Approach., and . Int. J. Cyber Warf. Terror., 7 (3): 29-43 (2017)Comparative analysis of blockchain technologies and TOR network: Two faces of the same reality?, , and . CSNet, page 1-9. IEEE, (2017)Formalization of malware through process calculi, , and . CoRR, (2009)