Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly Detection via Graphical Lasso., , , and . CoRR, (2018)Digital Greenhouse System via WSN., and . CWSN, volume 418 of Communications in Computer and Information Science, page 293-302. Springer, (2013)Improving the bound on the restricted isometry property constant in multiple orthogonal least squares., , and . IET Signal Process., 12 (5): 666-671 (2018)Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl., , , and . IACR Cryptol. ePrint Arch., (2012)Non-Markovianity of a Central Spin Interacting with a Lipkin-Meshkov-Glick Bath via a Conditional Past-Future Correlation., , , and . Entropy, 22 (8): 895 (2020)Entanglement generation of two quantum dots with Majorana fermions via optimal control., , and . Quantum Inf. Process., 17 (10): 272 (2018)Systems approach for congruence and selection of cancer models towards precision medicine., , , , , , , and . PLoS Comput. Biol., (January 2024)Known-Key Distinguisher on Round-Reduced 3D Block Cipher., , , and . WISA, volume 7115 of Lecture Notes in Computer Science, page 55-69. Springer, (2011)Improved Meet-in-the-Middle Cryptanalysis on Kupyna., , , and . ICCNS, page 136-143. ACM, (2023)Cryptanalysis of the Round-Reduced GOST Hash Function., , and . Inscrypt, volume 8567 of Lecture Notes in Computer Science, page 309-322. Springer, (2013)