?
Information Security and Cryptology; Lecture Notes in Computer Science ,
2
Non-malleable Codes from Leakage Resilient Cryptographic Pr..:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
3
Security Analysis of WAGE Against Division Property Based C..:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
4
New Techniques for Modeling SBoxes: An MILP Approach:
, In:
?
Applications and Techniques in Information Security; Communications in Computer and Information Science ,
5
Deep Learning Based Differential Classifier of PRIDE and RC:
, In:
?
Lecture Notes in Networks and Systems; Proceedings of the Ninth International Conference on Mathematics and Computing ,
7
Facial Image Manipulation Detection Using Cellular Automata..:
, In:
?
Lecture Notes in Networks and Systems; Proceedings of the Ninth International Conference on Mathematics and Computing ,
9
Security Analysis of WG-7 Lightweight Stream Cipher Against..:
, In:
?
Communications in Computer and Information Science; Cyber Warfare, Security and Space Research ,
10
Preventing Fault Attacks on S-Boxes of AES-Like Block Ciphe..:
, In:
?
Proceedings of the Seventh International Conference on Mathematics and Computing; Advances in Intelligent Systems and Computing ,
11
Image Encryption with Parallel Evolution of 2-D Cellular Au..:
, In:
?
Proceedings of the Seventh International Conference on Mathematics and Computing; Advances in Intelligent Systems and Computing ,
12
CArrency: An Energy-Efficient Proof-of-Work Scheme for Cryp..:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
15