252 Citations
A brief history on Homomorphic learning: A privacy-focused approach to machine learning
- Computer Science
- ArXiv
- 2020
- Highly Influenced
- PDF
Studies of Cipher Keys from the 16th Century : Transcription, Systematisation and Analysis
- Computer Science
- 2019
- 1
- Highly Influenced
- PDF
The Devil ’ s Right Hand : An Investigation on Malware-oriented Obfuscation Techniques
- 2016
- 1
- Highly Influenced
- PDF
On Information Integrity Measurement with Secure Hash Algorithm (SHA)
- Computer Science
- 2015
- 1
- Highly Influenced
- PDF
The Impact of the Allied Cryptographers on World War II : Cryptanalysis of the Japanese and German Cipher Machines
- Computer Science
- 2014
- 1
- Highly Influenced
- PDF
Recent Methods for Cryptanalysis of Symmetric-key Cryptographic Algorithms (Recente Methoden voor de Cryptanalyse van Symmetrische-sleutel Cryptografische Algoritmen)
- Computer Science
- 2012
- Highly Influenced
- PDF
From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography
- Computer Science, Mathematics
- ArXiv
- 2020
- Highly Influenced
- PDF