From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptographic Primitives for Information Authentication - State of the Art. State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures, стр. 49-104. London, UK, Springer-Verlag, (1998)Technologies for controlled anonymity, , , , , , , , , и 1 other автор(ы). Deliverable 10. Anonymity and Privacy in Electronic Services, (2003)Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP., , , , и . CHES, том 3659 из Lecture Notes in Computer Science, стр. 106-118. Springer, (2005)Probabilistic Algebraic Attacks., и . IMACC, том 3796 из Lecture Notes in Computer Science, стр. 290-303. Springer, (2005)On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions., , , и . IMACC, том 2898 из Lecture Notes in Computer Science, стр. 82-92. Springer, (2003)Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems., и . Public Key Cryptography, том 3386 из Lecture Notes in Computer Science, стр. 275-287. Springer, (2005)On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem., , и . Public Key Cryptography, том 2274 из Lecture Notes in Computer Science, стр. 199-210. Springer, (2002)Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment., , и . CHES, том 7428 из Lecture Notes in Computer Science, стр. 268-282. Springer, (2012)On Weaknesses of Non-surjective Round Functions., , и . Des. Codes Cryptogr., 12 (3): 253-266 (1997)A fast dual-field modular arithmetic logic unit and its hardware implementation., , и . ISCAS, IEEE, (2006)