From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators., , , и . Inscrypt, том 7763 из Lecture Notes in Computer Science, стр. 294-310. Springer, (2012)A New Method for Searching Optimal Differential and Linear Trails in ARX Ciphers., , , и . IEEE Trans. Inf. Theory, 67 (2): 1054-1068 (2021)Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers., , , , и . IACR Cryptol. ePrint Arch., (2022)Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE., , , и . IACR Cryptol. ePrint Arch., (2023)Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect., , , , и . IACR Cryptol. ePrint Arch., (2023)Observer-Based Adaptive Finite-Time Neural Control for Constrained Nonlinear Systems With Actuator Saturation Compensation., , , , , и . IEEE Trans. Instrum. Meas., (2024)Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks., , и . ISC, том 8783 из Lecture Notes in Computer Science, стр. 104-119. Springer, (2014)Faster Algorithms for Solving LPN., , и . EUROCRYPT (1), том 9665 из Lecture Notes in Computer Science, стр. 168-195. Springer, (2016)Evidence for one-dimensional chiral edge states in a magnetic Weyl semimetal Co$_3$Sn$_2$S$_2$, , , , , , , , , и 4 other автор(ы). Nat. Commun., 12 (1): 4269 (13.07.2021)Specifications and improvements of LPN solving algorithms.. IET Inf. Secur., 14 (1): 111-125 (2020)