Author of the publication

Hyper-bent Functions.

, and . EUROCRYPT, volume 2045 of Lecture Notes in Computer Science, page 406-419. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers., and . CCECE, page 1582-1585. IEEE, (2006)A Privacy Preserving Approach to Smart Metering., , and . SecNet, volume 381 of Communications in Computer and Information Science, page 164-176. Springer, (2013)Ergodic Secrecy Rate Analysis of Ultra-Dense Networks with Multiple Antennas., , and . ICC, page 1-6. IEEE, (2021)Horus: A Security Assessment Framework for Android Crypto Wallets., , and . SecureComm (2), volume 399 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 120-139. Springer, (2021)Secrecy Performance in Ultra-Dense Networks with Multiple Associations., , and . GLOBECOM (Workshops), page 1-6. IEEE, (2020)Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps., , and . ESORICS Workshops (1), volume 14398 of Lecture Notes in Computer Science, page 232-248. Springer, (2023)A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem., and . ARES, page 402-409. IEEE Computer Society, (2012)Related-Key Differential Cryptanalysis of Full Round CRAFT., and . SPACE, volume 11947 of Lecture Notes in Computer Science, page 50-66. Springer, (2019)GASE: A Lightweight Group Authentication Scheme With Key Agreement for Edge Computing Applications., , and . IEEE Internet Things J., 10 (1): 840-854 (2023)Mjolnir: Breaking the Glass in a Publicly Verifiable Yet Private Manner., , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 2942-2956 (September 2023)