Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Performance of Secret Entropy Coding: A Perspective Beyond Security.. Autonomous Systems: Developments and Trends, volume 391 of Studies in Computational Intelligence, Springer, (2012)Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers., , , and . Chaos-Based Cryptography, volume 354 of Studies in Computational Intelligence, Springer, (2011)Performance benchmarking of RVC based multimedia specifications., , and . ICIP, page 4569-4573. IEEE, (2013)Security problems with improper implementations of improved FEA-M., and . Journal of Systems and Software, 80 (5): 791-794 (2007)Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks., , , and . IACR Cryptology ePrint Archive, (2012)Cryptanalysis of a computer cryptography scheme based on a filter bank, , , and . CoRR, (2007)A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS), , , and . CoRR, (2009)On the Security of the Yi-Tan-Siew Chaos-Based Cipher, , and . CoRR, (2004)Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables, , , and . CoRR, (2005)Enhanced perceptual image authentication with tamper localization and self-restoration., , , , and . ICME, page 1-6. IEEE Computer Society, (2014)