From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A fast dual-field modular arithmetic logic unit and its hardware implementation., , и . ISCAS, IEEE, (2006)Identification via location-profiling in GSM networks., , , и . WPES, стр. 23-32. ACM, (2008)Location privacy in wireless personal area networks., и . Workshop on Wireless Security, стр. 11-18. ACM, (2006)Elliptic Curve Public-Key Cryptosystems - An Introduction., и . State of the Art in Applied Cryptography, том 1528 из Lecture Notes in Computer Science, стр. 131-141. Springer, (1997)The State of Cryptographic Hash Functions.. Lectures on Data Security, том 1561 из Lecture Notes in Computer Science, стр. 158-182. Springer, (1998)Standardization of Cryptographic Techniques.. Computer Security and Industrial Cryptography, том 741 из Lecture Notes in Computer Science, стр. 162-173. Springer, (1991)Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks., и . SPC, том 3450 из Lecture Notes in Computer Science, стр. 86-100. Springer, (2005)Equivalent Keys in HFE, C*, and Variations., и . Mycrypt, том 3715 из Lecture Notes in Computer Science, стр. 33-49. Springer, (2005)A Memory Efficient Version of Satoh's Algorithm., , и . EUROCRYPT, том 2045 из Lecture Notes in Computer Science, стр. 1-13. Springer, (2001)A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms., , , и . EUROCRYPT, том 2656 из Lecture Notes in Computer Science, стр. 33-50. Springer, (2003)