Emil Simion

Orcid: 0000-0003-0561-3474

According to our database1, Emil Simion authored at least 48 papers between 1994 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
n-Color Partitions into Distinct Parts as Sums over Partitions.
Symmetry, November, 2023

Quantum-Safe Protocols and Application in Data Security of Medical Records.
IACR Cryptol. ePrint Arch., 2023

Security of Ethereum Layer 2s.
IACR Cryptol. ePrint Arch., 2023

A way of decrypting particular malware payloads found in MZPE files.
IACR Cryptol. ePrint Arch., 2023

An analysis of a scheme proposed for electronic voting systems.
IACR Cryptol. ePrint Arch., 2023

A note on machine learning applied in ransomware detection.
IACR Cryptol. ePrint Arch., 2023

A security analysis comparison between Signal, WhatsApp and Telegram.
IACR Cryptol. ePrint Arch., 2023

2022
A remark on the NIST 800-22 Binary Matrix Rank Test.
IACR Cryptol. ePrint Arch., 2022

Preparation for Post-Quantum era: a survey about blockchain schemes from a post-quantum perspective.
IACR Cryptol. ePrint Arch., 2022

Storage Security in Cloud Computing: Data Auditing Protocols.
IACR Cryptol. ePrint Arch., 2022

A remark on NIST SP 800-22 serial test.
IACR Cryptol. ePrint Arch., 2022

A survey on the security protocols employed by mobile messaging applications.
IACR Cryptol. ePrint Arch., 2022

2021
A note on the QFT randomness spectral test a new approach of DST.
IACR Cryptol. ePrint Arch., 2021

Information Security in the Quantum Era. Threats to modern cryptography: Grover’s algorithm.
IACR Cryptol. ePrint Arch., 2021

A Note on IBE Performance of a Practical Application.
IACR Cryptol. ePrint Arch., 2021

FPGA Offloading for Diffie-Hellman Key Exchangeusing Elliptic Curves.
IACR Cryptol. ePrint Arch., 2021

A Comparative Study of Cryptographic Key Distribution Protocols.
IACR Cryptol. ePrint Arch., 2021

E-voting protocols in context of COVID19.
IACR Cryptol. ePrint Arch., 2021

A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization.
IACR Cryptol. ePrint Arch., 2021

A Multifunctional Modular Implementation of Grover's Algorithm.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2021

2020
A Scalable Simulation of the BB84 Protocol Involving Eavesdropping.
IACR Cryptol. ePrint Arch., 2020

New directions in the ransomware phenomenon.
IACR Cryptol. ePrint Arch., 2020

Entropy and Randomness: From Analogic to Quantum World.
IEEE Access, 2020

2019
A note on the correlations between NIST cryptographic statistical tests suite.
IACR Cryptol. ePrint Arch., 2019

Statistical Analysis and Anonymity of TOR's Path Selection.
IACR Cryptol. ePrint Arch., 2019

2018
Challenges in cyber security - Ransomware Phenomenon.
IACR Cryptol. ePrint Arch., 2018

Trends in design of ransomware viruses.
IACR Cryptol. ePrint Arch., 2018

Post-quantum Cryptography and a (Qu)Bit More.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018

Challenges in Automotive Security.
Proceedings of the 2018 10th International Conference on Electronics, 2018

Linux Unified Key Setup (LUKS) - The Good, the Bad, the Ugly.
Proceedings of the 2018 10th International Conference on Electronics, 2018

Challenges in Cyber Security: Ransomware Phenomenon.
Proceedings of the Cyber-Physical Systems Security., 2018

2017
NIST Randomness Tests (in)dependence.
IACR Cryptol. ePrint Arch., 2017

Steganography techniques.
IACR Cryptol. ePrint Arch., 2017

Enhancing security by combining biometrics and cryptography.
Proceedings of the 9th International Conference on Electronics, 2017

A view on NIST randomness tests (In)Dependence.
Proceedings of the 9th International Conference on Electronics, 2017

2016
TOR - Didactic pluggable transport.
IACR Cryptol. ePrint Arch., 2016

RSA Weak Public Keys available on the Internet.
IACR Cryptol. ePrint Arch., 2016

2015
The Relevance of Statistical Tests in Cryptography.
IEEE Secur. Priv., 2015

New Results on Identity-based Encryption from Quadratic Residuosity.
IACR Cryptol. ePrint Arch., 2015

Applying Cryptographic Acceleration Techniques to Error Correction.
IACR Cryptol. ePrint Arch., 2015

CART Versus CHAID Behavioral Biometric Parameter Segmentation Analysis.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015

2014
Applied cybersecurity using game theory elements.
Proceedings of the 10th International Conference on Communications, 2014

The relevance of second error probability in modern statistical analysis.
Proceedings of the 6th International Conference on Electronics, 2014

2012
New directions in cloud computing. A security perspective.
Proceedings of the 9th International Conference on Communications, 2012

2011
Can a Program Reverse-Engineer Itself?
IACR Cryptol. ePrint Arch., 2011

1996
Applications of symbolic network analysis.
Proceedings of Third International Conference on Electronics, Circuits, and Systems, 1996

Radio frequency link used in partially-implanted auditory prosthesis.
Proceedings of Third International Conference on Electronics, Circuits, and Systems, 1996

1994
Computer Utilization for Speaking Re-Education.
Proceedings of the Computers for Handicapped Persons, 4th International Conference, 1994


  Loading...