?
Lecture Notes in Networks and Systems; Proceedings of the Tenth International Conference on Mathematics and Computing ,
2
Key-Dependent Dynamic SBox for KASUMI Block Cipher:
, In:
?
Lecture Notes in Networks and Systems; Proceedings of the Tenth International Conference on Mathematics and Computing ,
3
Guarding the Beats by Defending Resource Depletion Attacks ..:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
4
Non-malleable Codes from Leakage Resilient Cryptographic Pr..:
, In:
?
Lecture Notes in Networks and Systems; Proceedings of the Tenth International Conference on Mathematics and Computing ,
5
Deep Learning-Based Differential Distinguishers for NIST St..:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
7
New Techniques for Modeling SBoxes: An MILP Approach:
, In:
?
Lecture Notes in Networks and Systems; Proceedings of the Ninth International Conference on Mathematics and Computing ,
8
Facial Image Manipulation Detection Using Cellular Automata..:
, In:
?
Lecture Notes in Networks and Systems; Proceedings of the Ninth International Conference on Mathematics and Computing ,
9
Security Analysis of WG-7 Lightweight Stream Cipher Against..:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
10
Security Analysis of WAGE Against Division Property Based C..:
, In:
?
Applications and Techniques in Information Security; Communications in Computer and Information Science ,
11
Deep Learning Based Differential Classifier of PRIDE and RC:
, In:
?
Communications in Computer and Information Science; Cyber Warfare, Security and Space Research ,
13
Preventing Fault Attacks on S-Boxes of AES-Like Block Ciphe..:
, In:
?
Proceedings of the Seventh International Conference on Mathematics and Computing; Advances in Intelligent Systems and Computing ,
14
Image Encryption with Parallel Evolution of 2-D Cellular Au..:
, In:
?
Proceedings of the Seventh International Conference on Mathematics and Computing; Advances in Intelligent Systems and Computing ,
15