From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Preimage Attacks on 3, 4, and 5-Pass HAVAL., и . ASIACRYPT, том 5350 из Lecture Notes in Computer Science, стр. 253-271. Springer, (2008)On the Use of GF-Inversion as a Cryptographic Primitive., и . Selected Areas in Cryptography, том 3006 из Lecture Notes in Computer Science, стр. 234-247. Springer, (2003)On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers., и . IWSEC, том 10418 из Lecture Notes in Computer Science, стр. 3-18. Springer, (2017)Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes., и . ACNS, том 9696 из Lecture Notes in Computer Science, стр. 467-484. Springer, (2016)Integer Factoring Utilizing PC Cluster.. CHES, том 4249 из Lecture Notes in Computer Science, стр. 60. Springer, (2006)On Maximum Non-averaged Differential Probability.. Selected Areas in Cryptography, том 1556 из Lecture Notes in Computer Science, стр. 118-130. Springer, (1998)Elliptic Curve Arithmetic Using SIMD., , , и . ISC, том 2200 из Lecture Notes in Computer Science, стр. 235-247. Springer, (2001)Improving the Search Algorithm for the Best Linear Expression., , и . CRYPTO, том 963 из Lecture Notes in Computer Science, стр. 157-170. Springer, (1995)Sieving Using Bucket Sort., и . ASIACRYPT, том 3329 из Lecture Notes in Computer Science, стр. 92-102. Springer, (2004)Preimages for Step-Reduced SHA-2., , , , и . ASIACRYPT, том 5912 из Lecture Notes in Computer Science, стр. 578-597. Springer, (2009)