Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Другие публикации лиц с тем же именем

Nonlinear Equivalence of Stream Ciphers., и . FSE, том 6147 из Lecture Notes in Computer Science, стр. 40-54. Springer, (2010)Algebraic Algorithms for LWE Problems., , , , и . IACR Cryptology ePrint Archive, (2014)On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms., , , и . IACR Cryptology ePrint Archive, (2011)The rakaposhi Stream Cipher., , и . ICICS, том 5927 из Lecture Notes in Computer Science, стр. 32-46. Springer, (2009)Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics., , и . Inf., 12 (8): 297 (2021)Partitioning Oracles from Weak Key Forgeries., и . IACR Cryptol. ePrint Arch., (2021)Influence of the Linear Layer on the Algebraic Degree in SP-Networks., , , , , и . IACR Trans. Symmetric Cryptol., 2022 (1): 110-137 (2022)Access Control in Publicly Verifiable Outsourced Computation., , , и . AsiaCCS, стр. 657-662. ACM, (2015)Revocation in Publicly Verifiable Outsourced Computation., , , и . Inscrypt, том 8957 из Lecture Notes in Computer Science, стр. 51-71. Springer, (2014)A Comparison of GKE Protocols based on SIDH., , и . SECRYPT, стр. 507-514. SCITEPRESS, (2021)