Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JHAE: An Authenticated Encryption Mode Based on JH., , and . IACR Cryptology ePrint Archive, (2014)Linear Cryptanalysis of Round Reduced SIMON., , , , and . IACR Cryptology ePrint Archive, (2013)Improved Linear Cryptanalysis of Round Reduced SIMON., , , , , and . IACR Cryptology ePrint Archive, (2014)ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN., , and . Wirel. Pers. Commun., 126 (4): 2911-2935 (2022)A New Distinguisher for CubeHash-8/b and CubeHash-15/b Compression Functions., and . IACR Cryptology ePrint Archive, (2011)Cryptanalysis of SIMON Variants with Connections., , , , , , , and . RFIDSec, volume 8651 of Lecture Notes in Computer Science, page 90-107. Springer, (2014)Artemia: a family of provably secure authenticated encryption schemes., , and . ISeCure, 6 (2): 125-139 (2014)Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48., , , , , and . INDOCRYPT, volume 9462 of Lecture Notes in Computer Science, page 153-179. Springer, (2015)Cryptanalysis of some first round CAESAR candidates., , , and . ISeCure, 7 (2): 127-134 (2015)Bot Undercover: On the Use of Conversational Agents to Stimulate Teacher-Students Interaction in Remote Learning., , , and . VR Workshops, page 277-282. IEEE, (2022)