Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential Cryptanalysis of the Data Encryption Standard., and . Springer, (1993)Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64., , , and . FSE, volume 8540 of Lecture Notes in Computer Science, page 390-410. Springer, (2014)Cube Attacks on Tweakable Black Box Polynomials., and . IACR Cryptology ePrint Archive, (2008)Guaranteeing the diversity of number generators., and . IACR Cryptology ePrint Archive, (2003)Un-Trusted-HB: Security Vulnerabilities of Trusted-HB., and . IACR Cryptology ePrint Archive, (2009)Drones' Cryptanalysis - Smashing Cryptography with a Flicker., , , and . IEEE Symposium on Security and Privacy, page 1397-1414. IEEE, (2019)PayWord and MicroMint: Two Simple Micropayment Schemes., and . Security Protocols Workshop, volume 1189 of Lecture Notes in Computer Science, page 69-87. Springer, (1996)Playing "Hide and Seek" with Stored Keys., and . Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, page 118-124. Springer, (1999)Data Types as Objects., and . ICALP, volume 52 of Lecture Notes in Computer Science, page 465-479. Springer, (1977)How to Share a Secret.. Commun. ACM, 22 (11): 612-613 (1979)