| Publication | Date of Publication | Type |
|---|
| A bit-vector differential model for the modular addition by a constant | 2023-03-21 | Paper |
A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis Designs, Codes and Cryptography | 2022-08-04 | Paper |
An LWE-based verifiable threshold secret sharing scheme Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] | 2021-09-23 | Paper |
BIA for the K-User Interference Channel Using Reconfigurable Antenna at Receivers IEEE Transactions on Information Theory | 2020-09-29 | Paper |
A Correlation Measure Based on Vector-Valued $L_p$ -Norms IEEE Transactions on Information Theory | 2020-01-28 | Paper |
A Multi-Layer Encoding and Decoding Strategy for Binary Erasure Channel IEEE Transactions on Information Theory | 2019-07-19 | Paper |
Direction-of-Arrival Estimation for Temporally Correlated Narrowband Signals IEEE Transactions on Signal Processing | 2018-07-09 | Paper |
Statistical Performance Analysis of MDL Source Enumeration in Array Processing IEEE Transactions on Signal Processing | 2018-07-09 | Paper |
Perfectly Secure Index Coding IEEE Transactions on Information Theory | 2018-06-27 | Paper |
A Fast Multiple-Source Detection and Localization Array Signal Processing Algorithm Using the Spatial Filtering and ML Approach IEEE Transactions on Signal Processing | 2018-06-12 | Paper |
Simulation of a Channel with Another Channel (available as arXiv preprint) | 2017-08-25 | Paper |
The Capacity Region of p -Transmitter/ q -Receiver Multiple-Access Channels With Common Information IEEE Transactions on Information Theory | 2017-07-12 | Paper |
On the Capacity of Interference Channel With Causal and Noncausal Generalized Feedback at the Cognitive Transmitter IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Slepian–Wolf Coding Over Cooperative Relay Networks IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Symmetric Semideterministic Relay Networks With No Interference at the Relays IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Achievability Proof via Output Statistics of Random Binning IEEE Transactions on Information Theory | 2017-05-16 | Paper |
Channel Simulation via Interactive Communications IEEE Transactions on Information Theory | 2017-04-28 | Paper |
An Improved Truncated Differential Cryptanalysis of Klein Tatra Mountains Mathematical Publications | 2017-03-29 | Paper |
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension Designs, Codes and Cryptography | 2016-09-08 | Paper |
2D hash chain robust random key distribution scheme Information Processing Letters | 2016-03-01 | Paper |
Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48 Progress in Cryptology -- INDOCRYPT 2015 | 2016-01-12 | Paper |
Efficient secure channel coding based on quasi-cyclic low-density parity-check codes IET Communications | 2013-10-18 | Paper |
Rate regions of secret key sharing in a new source model IET Communications | 2013-10-18 | Paper |
Multiple-access channel with correlated states and cooperating encoders IET Communications | 2013-10-18 | Paper |
Symmetric relaying based on partial decoding and the capacity of a class of relay networks IET Communications | 2013-10-18 | Paper |
Comprehensive partial decoding approach for two-level relay networks IET Communications | 2013-10-18 | Paper |
New achievable rate and a certain capacity result for a stochastic two relay network with no interference IET Communications | 2013-10-18 | Paper |
Unified approach to the capacity evaluation of the relay channel IET Communications | 2013-10-18 | Paper |
Achievable rate region for broadcast-relay networks with two cooperative relays IET Communications | 2013-10-18 | Paper |
Compress-and-forward strategy for relay channel with causal and non-causal channel state information IET Communications | 2013-10-18 | Paper |
Achievable rate region for multiple-access-relay-networks IET Communications | 2013-10-18 | Paper |
Capacity of a class of symmetric relay networks with orthogonal components IET Communications | 2013-10-18 | Paper |
Generalised secure distributed source coding with side information IET Communications | 2013-10-18 | Paper |
Cooperative relay broadcast channels with partial causal channel state information IET Communications | 2013-10-18 | Paper |
Desynchronization attack on RAPP ultralightweight authentication protocol Information Processing Letters | 2013-03-20 | Paper |
Addressing flaws in RFID authentication protocols Lecture Notes in Computer Science | 2011-12-16 | Paper |
| Algebraic attacks from a Groebner basis perspective | 2011-02-14 | Paper |
| Detection of a band-limited signal using an orthonormal, fully-decimated filter-bank | 2009-08-10 | Paper |
| scientific article; zbMATH DE number 2247813 (Why is no real title available?) | 2006-01-16 | Paper |
The KryptoKnight family of protocols: Evaluation and enhancement Scientia Iranica | 2001-09-09 | Paper |
| scientific article; zbMATH DE number 1135080 (Why is no real title available?) | 1999-01-10 | Paper |