Author of the publication

A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks.

, , , , and . IACR Cryptology ePrint Archive, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A neurofuzzy arbitrage simulator for stock investing., and . CIFEr, page 160-177. IEEE, (1995)A synergistic security method for control-flow hijacking detection using SPNs., and . IISA, page 1-5. IEEE, (2013)A methodology for detecting blood-based abnormalities in Wireless Capsule Endoscopy videos., and . BIBE, page 1-6. IEEE, (2008)Picture data encryption using scan patterns., and . Pattern Recognit., 25 (6): 567-581 (1992)Preserving visual information in low resolution images during navigation of visually impaired., and . PETRA, volume 282 of ACM International Conference Proceeding Series, page 27. ACM, (2008)Image encryption method using a class of fractals., , and . J. Electronic Imaging, 4 (3): 251-259 (1995)Iris biometric authentication based on local global graphs: An FPGA implementation., and . CISDA, page 1-7. IEEE, (2009)A Schema Transformation Methodology for Distributed Heterogeneous Information Systems., , and . PARBASE / Databases, page 168-186. IEEE Computer Society, (1990)A Formal SPN Methodology for Single (1D) and Multiple Channels (2D) EEG Brain Activity Representations/Analysis/Diagnosis., and . BIBE, page 804-811. IEEE, (2019)A Wearable Ultrasound Methodology for Creating a Real Time Near 3D Model of the Heart., and . BIBE, page 539-546. IEEE, (2019)