From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Key recovery attacks on NTRU without ciphertext validation routine., , , и . IACR Cryptology ePrint Archive, (2002)Security Analysis of a Variant of Self-Shrinking Generator., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (7): 1824-1827 (2008)Cryptanalysis of Zhou et al.'s proxy-protected signature schemes., , и . Appl. Math. Comput., 169 (1): 192-197 (2005)Algebraic Attacks on Summation Generators., , , , и . FSE, том 3017 из Lecture Notes in Computer Science, стр. 34-48. Springer, (2004)New Public-Key Cryptosystem Using Braid Groups., , , , , и . CRYPTO, том 1880 из Lecture Notes in Computer Science, стр. 166-183. Springer, (2000)Algebraic Attacks on Summation Generators., , , , и . IACR Cryptology ePrint Archive, (2003)Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006., , и . IACR Cryptology ePrint Archive, (2007)Key Recovery Attacks on NTRU without Ciphertext Validation Routine., , , и . ACISP, том 2727 из Lecture Notes in Computer Science, стр. 274-284. Springer, (2003)An Efficient Implementation of Braid Groups., , , , и . ASIACRYPT, том 2248 из Lecture Notes in Computer Science, стр. 144-156. Springer, (2001)