Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Necessary and Sufficient Number of Cops in the Game of Cops and Robber in Multidimensional Grids, , and . CoRR, (2009)One Word/Cycle HC-128 Accelerator via State-Splitting Optimization., , , and . INDOCRYPT, volume 8885 of Lecture Notes in Computer Science, page 283-303. Springer, (2014)Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck., and . ACISP, volume 5107 of Lecture Notes in Computer Science, page 306-320. Springer, (2008)On biases of permutation and keystream bytes of RC4 towards the secret key., and . Cryptogr. Commun., 1 (2): 225-268 (2009)Preserving Privacy in Location-Based Services Using Sudoku Structures., , and . ICISS, volume 8880 of Lecture Notes in Computer Science, page 448-463. Springer, (2014)Towards a More Democratic Mining in Bitcoins., , and . ICISS, volume 8880 of Lecture Notes in Computer Science, page 185-203. Springer, (2014)Keyless Steganography in Spatial Domain Using Energetic Pixels., , , and . ICISS, volume 7671 of Lecture Notes in Computer Science, page 134-148. Springer, (2012)On effective sharing of user generated content., and . APCHI, page 114-118. ACM, (2013)Locating secret messages in images., and . KDD, page 545-550. ACM, (2004)Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE., , and . ACISP (1), volume 10342 of Lecture Notes in Computer Science, page 343-362. Springer, (2017)