No 2. CS (16) 2022
Papers
-
Recursive MDS matrices effective for implementation from Reed-Solomnon codes and direct exponent transformation
Abstract views: 1031 / PDF downloads: 372
-
Counting points on twisted Edwards curves over finite fields
Abstract views: 1003 / PDF downloads: 175
-
Application of deep learning model in network reconnaissance attack detection
Abstract views: 1201 / PDF downloads: 508
-
UET.SIR: An e-Government Information Security Incident Management Support Solution
Abstract views: 881 / PDF downloads: 342
-
Automatic functions exclusion in patch testing using chopped symbolic execution
Abstract views: 1038 / PDF downloads: 0
-
Build a user library for PCIe cryptographic accelerator
Abstract views: 1011 / PDF downloads: 274
-
Named entity recognition in Vietnamese document using machine learning and application in ensuring cyber security
Abstract views: 1123 / PDF downloads: 590
-
An efficient and secure linear diffusion layer for 256-bit block cipher based on FLC structure
Abstract views: 870 / PDF downloads: 305
-
Privacy-preserving frequent itemset mining in vertically distributed data using ElGamal encryption
Abstract views: 753 / PDF downloads: 325










