Author of the publication

Cryptanalysis of a one round chaos-based Substitution Permutation Network.

, , and . Signal Processing, 93 (5): 1358-1364 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions., , , , , and . Advances in Cyber Security, Springer, (2019)Local Context Discrimination in Signature Neural Networks., , and . IWINAC (2), volume 6687 of Lecture Notes in Computer Science, page 400-408. Springer, (2011)Detection Method for Phase Synchronization in a Population of Spiking Neurons., and . IWINAC (1), volume 7930 of Lecture Notes in Computer Science, page 421-431. Springer, (2013)Effects of Locomotive Drift in Scale-Invariant Robotic Search Strategies., , , and . Living Machines, volume 10384 of Lecture Notes in Computer Science, page 161-169. Springer, (2017)Input Pattern Complexity Determines Specialist and Generalist Populations in Drosophila Neural Network., , and . ICANN (2), volume 11140 of Lecture Notes in Computer Science, page 296-303. Springer, (2018)Compression-Based Clustering of Video Human Activity Using an ASCII Encoding., , , and . ICANN (2), volume 11140 of Lecture Notes in Computer Science, page 66-75. Springer, (2018)Evolutionary Tuning of a Pulse Mormyrid Electromotor Model to Generate Stereotyped Sequences of Electrical Pulse Intervals., , and . ICANN (2), volume 11140 of Lecture Notes in Computer Science, page 359-368. Springer, (2018)Strategies to Enhance Pattern Recognition in Neural Networks Based on the Insect Olfactory System., , and . ICANN (1), volume 11139 of Lecture Notes in Computer Science, page 468-475. Springer, (2018)Block attractor in spatially organized neural networks., , and . Neurocomputing, 72 (16-18): 3795-3801 (2009)A formal methodology for integral security design and verification of network protocols., , and . Journal of Systems and Software, (2014)