Author of the publication

Testing of Code-Based Pseudorandom Number Generators for Post-Quantum Application.

, , , , , and . DESSERT, page 172-177. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Hiding Using 3D-Printing Technology., , , , , and . IDAACS, page 701-706. IEEE, (2019)Hiding data in vector images: software implementation and experimental research., , and . Multim. Tools Appl., 82 (10): 14581-14607 (April 2023)Techniques for Raising the Remainder to a Power in the System of Residual Classes., , , , and . DESSERT, page 145-150. IEEE, (2020)Multiple Axis-Aligned Filters for Rendering of Combined Distribution Effects., , , and . Comput. Graph. Forum, 36 (4): 155-166 (2017)Photon-Driven Neural Reconstruction for Path Guiding., , , , , , , and . ACM Trans. Graph., 41 (1): 7:1-7:15 (2022)Extrapolation to calculate the probability of a double spending attack., , , and . CMIS, volume 2608 of CEUR Workshop Proceedings, page 610-620. CEUR-WS.org, (2020)The data errors control in the modular number system based on the nullification procedure., , , and . CMIS, volume 2608 of CEUR Workshop Proceedings, page 580-593. CEUR-WS.org, (2020)The Design of Boolean Functions by Modified Hill Climbing Method., , and . ITNG, page 356-361. IEEE Computer Society, (2009)Fault Tolerance Computer System Structures Functioning in Residue Classes., , , and . IDAACS, page 471-474. IEEE, (2021)Comment on "Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications"., and . IDAACS, page 485-488. IEEE, (2021)