Personensuche
X
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
2
Non-malleable Codes from Leakage Resilient Cryptographic Pr..:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
3
Security Analysis of WAGE Against Division Property Based C..:
, In:
?
Applications and Techniques in Information Security; Communications in Computer and Information Science ,
4
Deep Learning Based Differential Classifier of PRIDE and RC:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
6
New Techniques for Modeling SBoxes: An MILP Approach:
, In:
?
Lecture Notes in Networks and Systems; Proceedings of the Ninth International Conference on Mathematics and Computing ,
7
Security Analysis of WG-7 Lightweight Stream Cipher Against..:
, In:
?
Lecture Notes in Networks and Systems; Proceedings of the Ninth International Conference on Mathematics and Computing ,
8
Facial Image Manipulation Detection Using Cellular Automata..:
, In:
?
Proceedings of the Seventh International Conference on Mathematics and Computing; Advances in Intelligent Systems and Computing ,
10
Image Encryption with Parallel Evolution of 2-D Cellular Au..:
, In:
?
Communications in Computer and Information Science; Cyber Warfare, Security and Space Research ,
11
Preventing Fault Attacks on S-Boxes of AES-Like Block Ciphe..:
, In:
?
Proceedings of the Seventh International Conference on Mathematics and Computing; Advances in Intelligent Systems and Computing ,
12
CArrency: An Energy-Efficient Proof-of-Work Scheme for Cryp..:
, In:
?
Advances in Intelligent Systems and Computing; Proceedings of the Fifth International Conference on Mathematics and Computing ,
14