Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of the XO-64 Suitable for Wireless Systems., , and . Wireless Personal Communications, 93 (2): 589-600 (2017)Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b., , and . SCN, volume 4116 of Lecture Notes in Computer Science, page 95-110. Springer, (2006)New Efficient Padding Methods Secure Against Padding Oracle Attacks., , , , , , , and . ICISC, volume 9558 of Lecture Notes in Computer Science, page 329-342. Springer, (2015)A numerical method for the calculation of drag and lift of a deformable droplet in shear flow., and . J. Comput. Phys., (2013)A privacy preserving authentication scheme for roaming in ubiquitous networks., , , , and . Clust. Comput., 20 (2): 1223-1236 (2017)Partial Granger causality-based feature selection algorithm for workload prediction in cloud systems., , , , and . ICTC, page 81-86. IEEE, (2023)Related-Key Differential Attacks on Cobra-H64 and Cobra-H128., , , , , and . IMACC, volume 3796 of Lecture Notes in Computer Science, page 201-219. Springer, (2005)Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H., , , , and . INDOCRYPT, volume 3348 of Lecture Notes in Computer Science, page 191-205. Springer, (2004)Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128., , , , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 143-157. Springer, (2007)Impossible Differential Attack on 30-Round SHACAL-2., , , , , and . INDOCRYPT, volume 2904 of Lecture Notes in Computer Science, page 97-106. Springer, (2003)