Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experimental modeling the flow of character recognition results in video stream for document recognition., , , and . ICMV, volume 11041 of SPIE Proceedings, page 110411L. SPIE, (2018)1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher., , , and . IACR Cryptol. ePrint Arch., (2021)Informatics in an advanced mathematical high school., and . ITiCSE, page 231. ACM, (1996)Skye: An Expanding PRF based Fast KDF and its Applications., , , , and . AsiaCCS, ACM, (2024)Multiparty Routing: Secure Routing for Mixnets., , , and . CoRR, (2017)Comparison of scanned administrative document images., , , and . ICMV, volume 11433 of SPIE Proceedings, page 114333A. SPIE, (2019)An application of geometric aspects of variational autoencoder model to forgery detection of scanned documents., , and . ICMV, volume 11605 of SPIE Proceedings, page 116051H. SPIE, (2020)Let's Go Eevee! A Friendly and Suitable Family of AEAD Modes for IoT-to-Cloud Secure Computation., , , , and . CCS, page 2546-2560. ACM, (2023)OAE-RUP: A Strong Online AEAD Security Notion and Its Application to SAEF., , and . SCN (2), volume 14974 of Lecture Notes in Computer Science, page 117-139. Springer, (2024)On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing., , , and . CSF, page 1-16. IEEE, (2024)