Author of the publication

FFT-based multidimensional linear attack on PRESENT using the 2-bit-fixed characteristic.

, and . Security and Communication Networks, 8 (18): 3535-3545 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Graphical User Interface for Content-Based Image Retrieval Engine that Allows Remote Server Access Through the Internet., , , and . AMIA, AMIA, (1998)A memory-based reinforcement learning algorithm for partially observable Markovian decision processes., , and . IJCNN, page 800-805. IEEE, (2008)Integration and interoperability at the border in North America: a status report., , , , , , and . DG.O, page 239-240. Digital Government Research Center, (2010)Flipped Diversity Aloha in Wireless Networks with Long and Varying Delay., and . GLOBECOM, page 1-5. IEEE, (2011)Nationwide aerosol optical thickness retrieval application using grid computing platform., , , , , , , and . IGARSS, page 4284-4287. IEEE, (2007)Antarctic Snowmelt Detected by Diurnal Variations of AMSR-E Brightness Temperature., , , and . Remote Sensing, 10 (9): 1391 (2018)Localization of acupoints on a head based on a 3D virtual body., , , , and . Image Vision Comput., 23 (1): 1-9 (2005)A Quest for the Structure of Intra- and Postoperative Surgical Team Networks: Does the Small World Property Evolve over Time?, , , and . CoRR, (2018)TI-CNN: Convolutional Neural Networks for Fake News Detection., , , , , and . CoRR, (2018)Image Noise Level Estimation by Principal Component Analysis., , and . IEEE Trans. Image Processing, 22 (2): 687-699 (2013)