From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On Authentication with HMAC and Non-random Properties., и . Financial Cryptography, том 4886 из Lecture Notes in Computer Science, стр. 119-133. Springer, (2007)Recent Developments in the Design of Conventional Cryptographic Algorithms., , и . State of the Art in Applied Cryptography, том 1528 из Lecture Notes in Computer Science, стр. 105-130. Springer, (1997)Proving Key Usage., и . WISA, том 3325 из Lecture Notes in Computer Science, стр. 65-72. Springer, (2004)Known-Key Distinguishers for Some Block Ciphers., и . ASIACRYPT, том 4833 из Lecture Notes in Computer Science, стр. 315-324. Springer, (2007)A New MAC Construction ALRED and a Specific Instance ALPHA-MAC., и . FSE, том 3557 из Lecture Notes in Computer Science, стр. 1-17. Springer, (2005)A Family of Trapdoor Ciphers., и . FSE, том 1267 из Lecture Notes in Computer Science, стр. 139-148. Springer, (1997)The Block Cipher Square., , и . FSE, том 1267 из Lecture Notes in Computer Science, стр. 149-165. Springer, (1997)Differential Cryptanalysis of the ICE Encryption Algorithm., , и . FSE, том 1372 из Lecture Notes in Computer Science, стр. 270-283. Springer, (1998)The Wide Trail Design Strategy., и . IMACC, том 2260 из Lecture Notes in Computer Science, стр. 222-238. Springer, (2001)A new matrix form to generate all 3 × 3 involutory MDS matrices over F2m., , , , и . Inf. Process. Lett., (2019)