Albert H. Carlson

According to our database1, Albert H. Carlson authored at least 19 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Demonstrable Break of PCBC Mode.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

Analysis of a Cryptographically Secure Pseudo Random Number Generator.
Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2023

2022
Equivalence of Product Ciphers to Substitution Ciphers and their Security Implications.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

An Introduction to Local Entropy and Local Unicity.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

A Venona Style Attack to Determine Block Size, Language, and Attacking Ciphers.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

Shadow PUFs: Generating Temporal PUFs with Properties Isomorphic to Delay-Based APUFs.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2022

Novel Innovations for Improving the Quality of Weak PRNGs.
Proceedings of the 13th International Conference on Computing Communication and Networking Technologies, 2022

Novel Innovations that Failed to Improve Weak PRNGs.
Proceedings of the 13th International Conference on Computing Communication and Networking Technologies, 2022

Using the Collision Attack for Breaking Cryptographic Modes.
Proceedings of the 13th International Conference on Computing Communication and Networking Technologies, 2022

Space Selection and Abstraction in Set Theoretic Estimation.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

2021
Evaluating True Cryptographic Key Space Size.
Proceedings of the 12th IEEE Annual Ubiquitous Computing, 2021

Modeling Polymorphic Ciphers.
Proceedings of the Sixth International Conference on Fog and Mobile Edge Computing, 2021

2020
Lightweight Polymorphic Encryption for the Data Associated with Constrained Internet of Things Devices.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

An Empirical Analysis of Generative Adversarial Network Training Times with Varying Batch Sizes.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

Generative Adversarial Networks in Security: A Survey.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

Mathematical Modeling and Prediction of Neural Network Training based on RC Circuits.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

2019
A Design for a Cryptographically Secure Pseudo Random Number Generator.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Dynamic Key Generation for Polymorphic Encryption.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

2011
Breaking block and product ciphers applied across byte boundaries.
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011


  Loading...