From post

Analysis of Multivariate Encryption Schemes: Application to Dob.

, , и . Public Key Cryptography (1), том 12710 из Lecture Notes in Computer Science, стр. 155-183. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An infinite class of quadratic APN functions which are not equivalent to power mappings., , , и . ISIT, стр. 2637-2641. IEEE, (2006)On the Affine Transformations of HFE-Cryptosystems and Systems with Branches.. WCC, том 3969 из Lecture Notes in Computer Science, стр. 229-241. Springer, (2005)Analysis of Multivariate Encryption Schemes: Application to Dob., , и . Public Key Cryptography (1), том 12710 из Lecture Notes in Computer Science, стр. 155-183. Springer, (2021)C-Differentials, Multiplicative Uniformity, and (Almost) Perfect c-Nonlinearity., , , , и . IEEE Trans. Inf. Theory, 66 (9): 5781-5789 (2020)Constructing and Deconstructing Intentional Weaknesses in Symmetric Ciphers., , , и . CRYPTO (3), том 13509 из Lecture Notes in Computer Science, стр. 748-778. Springer, (2022)On Perfect Linear Approximations and Differentials over Two-Round SPNs., , , , и . CRYPTO (3), том 14083 из Lecture Notes in Computer Science, стр. 209-239. Springer, (2023)Cryptanalysis of the Multivariate Encryption Scheme EFLASH., , , и . CT-RSA, том 12006 из Lecture Notes in Computer Science, стр. 85-105. Springer, (2020)