From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Impossible differential attack on Simpira v2., , и . Sci. China Inf. Sci., 61 (3): 032106:1-032106:13 (2018)New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect., , и . IACR Cryptology ePrint Archive, (2020)Quantum cryptanalysis on some generalized Feistel schemes., , и . Sci. China Inf. Sci., 62 (2): 22501:1-22501:12 (2019)Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak., , , , и . Comput. J., 63 (8): 1231-1246 (2020)Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques., , , , и . Secur. Commun. Networks, (2018)Tree-Based Sentiment Dictionary for Affective Computing: A New Approach., , , , и . HPCC/SmartCity/DSS, стр. 1704-1709. IEEE, (2018)New Conditional Cube Attack on Keccak Keyed Modes., , , , , и . IACR Trans. Symmetric Cryptol., 2019 (2): 94-124 (2019)Impossible Differential Attack on Simpira v2., , и . IACR Cryptology ePrint Archive, (2016)A Refinement of Ä Key-recovery Attack on 855-round Trivium" From CRYPTO 2018., , , , , и . IACR Cryptology ePrint Archive, (2018)MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC., , и . IACR Cryptology ePrint Archive, (2018)