Author of the publication

CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps.

, , , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 329-342. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

M-Identity and Its Authentication Protocol for Secure Mobile Commerce Applications., and . CSS, volume 7672 of Lecture Notes in Computer Science, page 1-10. Springer, (2012)Secure arrays for digital watermarking., , , and . ICPR, page 1643-1645. IEEE Computer Society, (1998)Key Independent Watermark Detection., , and . ICMCS, Vol. 1, page 580-585. IEEE Computer Society, (1999)Evaluating micro-guidance sonification methods in manual tasks for Blind and Visually Impaired people., , and . OZCHI, page 260-271. ACM, (2022)Wavelet decomposition-based stereoscopic 3-D video watermarking - A comparative study., , and . ICSPCS, page 1-8. IEEE, (2017)A Preliminary Design for a Privacy-Friendly Free P2P Media File Distribution System.. KES (3), volume 3683 of Lecture Notes in Computer Science, page 1018-1024. Springer, (2005)Safe trajectory estimation at a pedestrian crossing to assist visually impaired people., , and . EMBC, page 5114-5117. IEEE, (2012)Blind User Perspectives on a Navigational Autonomy Aid., , and . REHAB, volume 515 of Communications in Computer and Information Science, page 248-259. Springer, (2014)A Digital Watermark., , and . ICIP (2), page 86-90. IEEE Computer Society, (1994)Mapping the mobile landscape in Australia., , , and . First Monday, (2006)