Research
Intro
Focus areas
Projects
Publications
Education
Culture
Events
People
Building trust in e-government services
Cryptanalysis of a robust key agreement based on public key authentication
Vendor malware: detection limits and mitigation
Security analysis of the IEEE 802.15.6 standard
Secure repairable fountain codes
On adaptive linear programming decoding of linear codes over GF(8)
Cryptanalysis of PRINCE with minimal data
Cryptanalysis of 6-round PRINCE using 2 known plaintexts
Constructing valid convex hull inequalities for single parity-check codes over prime fields
Spatially-coupled LDPC coding in threshold-based lossy forwarding scheme
1
2
Next
keyboard_arrow_up
Menu