Trial lecture: Swarm Learning
Friday seminar: Decoding and constructions of codes in rank and Hamming metric
Cryptanalysis of a robust key agreement based on public key authentication
- M. Toorani, “Cryptanalysis of a robust key agreement based on public key authentication” Journal of Security and Communication Networks, vol.9, no.1, 2016, p. 19–26