Author of the publication

Comment on "Particle Swarm Optimization Based Highly Nonlinear Substitution-Boxes Generation for Security Applications".

, and . IDAACS, page 485-488. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Methods for Comparing Numbers in Non-Positional Notation of Residual Classes., , , and . CMIS, volume 2353 of CEUR Workshop Proceedings, page 581-595. CEUR-WS.org, (2019)Merkle trees in blockchain: A Study of collision probability and security implications., , , , , and . Internet Things, (2024)Biometric Images Attacks Detecting Using Convolutional Neural Networks., , , , , and . CybHyg, volume 2654 of CEUR Workshop Proceedings, page 107-121. CEUR-WS.org, (2019)Soft Decoding Based on Ordered Subsets of Verification Equations of Turbo-Productive Codes., , , , , and . CMIS, volume 2353 of CEUR Workshop Proceedings, page 873-884. CEUR-WS.org, (2019)Discrete Signals with Special Correlation Properties., , , , , and . CMIS, volume 2353 of CEUR Workshop Proceedings, page 618-629. CEUR-WS.org, (2019)Scalable Zero-Knowledge Proofs for Verifying Cryptographic Hashing in Blockchain Applications., , , and . CoRR, (2024)Enhanced Security and Efficiency in Blockchain with Aggregated Zero-Knowledge Proof Mechanisms., , , , , and . CoRR, (2024)Probabilistic Analysis and Empirical Validation of Patricia Tries in Ethereum State Management., , , and . CoRR, (2024)Simulation of a Double Spending Attack on the Proof of Work Consensus Protocol., , , , , , and . CybHyg, volume 2654 of CEUR Workshop Proceedings, page 32-59. CEUR-WS.org, (2019)Statistical Testing of Blockchain Hash Algorithms., , , , , and . CMiGIN, volume 2588 of CEUR Workshop Proceedings, page 67-79. CEUR-WS.org, (2019)