default search action
Emil Simion
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j3]Mircea Merca, Emil Simion:
n-Color Partitions into Distinct Parts as Sums over Partitions. Symmetry 15(11): 2067 (2023) - [i31]Adrian-Daniel Stefan, Ionut-Petrisor Anghel, Emil Simion:
Quantum-Safe Protocols and Application in Data Security of Medical Records. IACR Cryptol. ePrint Arch. 2023: 41 (2023) - [i30]Manuela Horduna, Simona-Maria Lazarescu, Emil Simion:
A note on machine learning applied in ransomware detection. IACR Cryptol. ePrint Arch. 2023: 45 (2023) - [i29]Nicu Neculache, Vlad-Andrei Petcu, Emil Simion:
An analysis of a scheme proposed for electronic voting systems. IACR Cryptol. ePrint Arch. 2023: 55 (2023) - [i28]Corina-Elena Bogos, Razvan Mocanu, Emil Simion:
A security analysis comparison between Signal, WhatsApp and Telegram. IACR Cryptol. ePrint Arch. 2023: 71 (2023) - [i27]Tudorica Radu, Rares Radu, Emil Simion:
A way of decrypting particular malware payloads found in MZPE files. IACR Cryptol. ePrint Arch. 2023: 123 (2023) - [i26]Ionut Rosca, Alexandra-Ina Butnaru, Emil Simion:
Security of Ethereum Layer 2s. IACR Cryptol. ePrint Arch. 2023: 124 (2023) - 2022
- [i25]Andrada-Teodora Ciulei, Marian-Codrin Cretu, Emil Simion:
Preparation for Post-Quantum era: a survey about blockchain schemes from a post-quantum perspective. IACR Cryptol. ePrint Arch. 2022: 26 (2022) - [i24]Nicu Neculache, Vlad-Andrei Petcu, Emil Simion:
A remark on the NIST 800-22 Binary Matrix Rank Test. IACR Cryptol. ePrint Arch. 2022: 61 (2022) - [i23]Stefania Andries, Andrei-Daniel Miron, Andrei Cristian, Emil Simion:
A survey on the security protocols employed by mobile messaging applications. IACR Cryptol. ePrint Arch. 2022: 88 (2022) - [i22]Andrei-Alexandru Brebu, Mihai Iacov, Emil Simion:
Storage Security in Cloud Computing: Data Auditing Protocols. IACR Cryptol. ePrint Arch. 2022: 126 (2022) - [i21]Corina-Elena Bogos, Razvan Mocanu, Emil Simion:
A remark on NIST SP 800-22 serial test. IACR Cryptol. ePrint Arch. 2022: 172 (2022) - 2021
- [c19]Mihai-Zicu Mina, Emil Simion:
A Multifunctional Modular Implementation of Grover's Algorithm. SecITC 2021: 228-247 - [i20]Sfirnaciuc Emilia, Vasilescu Miruna-Elena, Emil Simion:
E-voting protocols in context of COVID19. IACR Cryptol. ePrint Arch. 2021: 27 (2021) - [i19]Alexandru-Stefan Gheorghies, Darius-Marian Lazaroi, Emil Simion:
A Comparative Study of Cryptographic Key Distribution Protocols. IACR Cryptol. ePrint Arch. 2021: 31 (2021) - [i18]Stefan Maftei, Marius Supuran, Emil Simion:
A Note on IBE Performance of a Practical Application. IACR Cryptol. ePrint Arch. 2021: 61 (2021) - [i17]Dorin-Marian Ionita, Emil Simion:
FPGA Offloading for Diffie-Hellman Key Exchangeusing Elliptic Curves. IACR Cryptol. ePrint Arch. 2021: 65 (2021) - [i16]Madalina Chirita, Alexandru-Mihai Stroie, Andrei-Daniel Safta, Emil Simion:
A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization. IACR Cryptol. ePrint Arch. 2021: 102 (2021) - [i15]Emil Simion, Elena Corina Cipu, Vasile-Laurentiu Dosan, Andrei-Voicu Tomut, Eugen Neacsu:
A note on the QFT randomness spectral test a new approach of DST. IACR Cryptol. ePrint Arch. 2021: 1625 (2021) - [i14]Mihai-Zicu Mina, Emil Simion:
Information Security in the Quantum Era. Threats to modern cryptography: Groverâs algorithm. IACR Cryptol. ePrint Arch. 2021: 1662 (2021) - 2020
- [j2]Emil Simion:
Entropy and Randomness: From Analogic to Quantum World. IEEE Access 8: 74553-74561 (2020) - [c18]Mihai-Zicu Mina, Emil Simion:
A Scalable Simulation of the BB84 Protocol Involving Eavesdropping. SECITC 2020: 91-109 - [e3]Emil Simion, Rémi Géraud-Stewart:
Innovative Security Solutions for Information Technology and Communications - 12th International Conference, SecITC 2019, Bucharest, Romania, November 14-15, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12001, Springer 2020, ISBN 978-3-030-41024-7 [contents] - [i13]Mihai-Zicu Mina, Emil Simion:
A Scalable Simulation of the BB84 Protocol Involving Eavesdropping. IACR Cryptol. ePrint Arch. 2020: 1074 (2020) - [i12]Mihai-Andrei Costandache, Marian-Stefan Mihalache, Emil Simion:
New directions in the ransomware phenomenon. IACR Cryptol. ePrint Arch. 2020: 1610 (2020)
2010 – 2019
- 2019
- [i11]Emil Simion, Paul Burciu:
A note on the correlations between NIST cryptographic statistical tests suite. IACR Cryptol. ePrint Arch. 2019: 551 (2019) - [i10]Andrei Mogage, Emil Simion:
Statistical Analysis and Anonymity of TOR's Path Selection. IACR Cryptol. ePrint Arch. 2019: 592 (2019) - 2018
- [c17]Danut Anton, Emil Simion:
Linux Unified Key Setup (LUKS) - The Good, the Bad, the Ugly. ECAI 2018: 1-6 - [c16]Irina-Georgiana Oancea, Emil Simion:
Challenges in Automotive Security. ECAI 2018: 1-6 - [c15]Diana Maimut, Emil Simion:
Post-quantum Cryptography and a (Qu)Bit More. SecITC 2018: 22-28 - [c14]Vlad Constantin Craciun, Andrei Mogage, Emil Simion:
Trends in Design of Ransomware Viruses. SecITC 2018: 259-272 - [p1]Vlad-Raul Pasca, Emil Simion:
Challenges in Cyber Security: Ransomware Phenomenon. Cyber-Physical Systems Security 2018: 303-330 - [i9]Vlad-Raul Pasca, Emil Simion:
Challenges in cyber security - Ransomware Phenomenon. IACR Cryptol. ePrint Arch. 2018: 125 (2018) - [i8]Vlad Constantin Craciun, Andrei Mogage, Emil Simion:
Trends in design of ransomware viruses. IACR Cryptol. ePrint Arch. 2018: 598 (2018) - 2017
- [c13]Carmina Georgescu, Emil Simion, Alina Petrescu-Nita, Antonela Toma:
A view on NIST randomness tests (In)Dependence. ECAI 2017: 1-4 - [c12]Diana Popa, Emil Simion:
Enhancing security by combining biometrics and cryptography. ECAI 2017: 1-7 - [e2]Pooya Farshim, Emil Simion:
Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10543, Springer 2017, ISBN 978-3-319-69283-8 [contents] - [i7]Carmina Georgescu, Alina Petrescu-Nita, Emil Simion, Antonela Toma:
NIST Randomness Tests (in)dependence. IACR Cryptol. ePrint Arch. 2017: 336 (2017) - [i6]Dragos Dumitrescu, Ioan-Mihail Stan, Emil Simion:
Steganography techniques. IACR Cryptol. ePrint Arch. 2017: 341 (2017) - 2016
- [c11]Mihai Barbulescu, Adrian Stratulat, Vlad Traista-Popescu, Emil Simion:
RSA Weak Public Keys Available on the Internet. SECITC 2016: 92-102 - [c10]Ioana-Cristina Panait, Cristian Pop, Alexandru Sirbu, Adelina Vidovici, Emil Simion:
TOR - Didactic Pluggable Transport. SECITC 2016: 225-239 - [i5]Ioana-Cristina Panait, Cristian Pop, Alexandru Sirbu, Adelina Vidovici, Emil Simion:
TOR - Didactic pluggable transport. IACR Cryptol. ePrint Arch. 2016: 506 (2016) - [i4]Mihai Barbulescu, Adrian Stratulat, Vlad Traista-Popescu, Emil Simion:
RSA Weak Public Keys available on the Internet. IACR Cryptol. ePrint Arch. 2016: 515 (2016) - 2015
- [j1]Emil Simion:
The Relevance of Statistical Tests in Cryptography. IEEE Secur. Priv. 13(1): 66-70 (2015) - [c9]Ionela Roxana Glavan, Daniel Petcu, Emil Simion:
CART Versus CHAID Behavioral Biometric Parameter Segmentation Analysis. SECITC 2015: 59-68 - [c8]Rémi Géraud, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Emil Simion:
Applying Cryptographic Acceleration Techniques to Error Correction. SECITC 2015: 150-168 - [e1]Ion Bica, David Naccache, Emil Simion:
Innovative Security Solutions for Information Technology and Communications - 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers. Lecture Notes in Computer Science 9522, Springer 2015, ISBN 978-3-319-27178-1 [contents] - [i3]Rémi Géraud, Diana-Stefania Maimut, David Naccache, Rodrigo Portella do Canto, Emil Simion:
Applying Cryptographic Acceleration Techniques to Error Correction. IACR Cryptol. ePrint Arch. 2015: 886 (2015) - [i2]Ferucio Laurentiu Tiplea, Emil Simion:
New Results on Identity-based Encryption from Quadratic Residuosity. IACR Cryptol. ePrint Arch. 2015: 900 (2015) - 2014
- [c7]Diana-Stefania Maimut, Emil Simion, Alecsandru Patrascu:
The relevance of second error probability in modern statistical analysis. ECAI 2014: 91-94 - [c6]Alecsandru Patrascu, Emil Simion:
Applied cybersecurity using game theory elements. COMM 2014: 1-4 - 2012
- [c5]Alecsandru Patrascu, Diana Maimut, Emil Simion:
New directions in cloud computing. A security perspective. COMM 2012: 289-292 - 2011
- [c4]Antoine Amarilli, David Naccache, Pablo Rauzy, Emil Simion:
Can a Program Reverse-Engineer Itself? IMACC 2011: 1-9 - [i1]Antoine Amarilli, David Naccache, Pablo Rauzy, Emil Simion:
Can a Program Reverse-Engineer Itself? IACR Cryptol. ePrint Arch. 2011: 497 (2011)
1990 – 1999
- 1996
- [c3]Marina Dana Topa, Emil Simion:
Applications of symbolic network analysis. ICECS 1996: 108-111 - [c2]Sorin Hintea, Emil Simion, Lelia Festila:
Radio frequency link used in partially-implanted auditory prosthesis. ICECS 1996: 1143-1146 - 1994
- [c1]Radu V. Ciupa, Alexandra A. Ciupa, Emil Simion:
Computer Utilization for Speaking Re-Education. ICCHP 1994: 350-354
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint