From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptanalysis of countermeasures against multiple transmission attacks on NTRU., , , и . IET Commun., 8 (12): 2142-2146 (2014)Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks., , , , и . Inscrypt, том 8567 из Lecture Notes in Computer Science, стр. 39-51. Springer, (2013)Further Improvement of Factoring RSA Moduli with Implicit Hint., , , , и . AFRICACRYPT, том 8469 из Lecture Notes in Computer Science, стр. 165-177. Springer, (2014)Processing Skyline Groups on Data Streams., , , , и . UIC/ATC/ScalCom, стр. 935-942. IEEE Computer Society, (2015)A matrix construction of Boolean functions with maximum algebraic immunity., и . J. Systems Science & Complexity, 25 (4): 792-801 (2012)Design and Implementation of Privacy-preserving Recommendation System Based on MASK., , , и . J. Softw., 9 (10): 2607-2613 (2014)Knowledge Acquisition Approach Based on Incremental Objects From Data With Missing Values., , и . IEEE Access, (2019)Reverse Direction-Based Surrounder Queries., , , и . APWeb, том 9313 из Lecture Notes in Computer Science, стр. 280-291. Springer, (2015)A rule extraction algorithm based on compound attribute measure in decision systems., , , и . FSKD, стр. 407-411. IEEE, (2013)Cube Cryptanalysis of Hitag2 Stream Cipher., , , и . CANS, том 7092 из Lecture Notes in Computer Science, стр. 15-25. Springer, (2011)