From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Consistent High Dimensional Rounding with Side Information., , , , , , и . CoRR, (2020)New Attacks on IDEA with at Least 6 Rounds., , , и . J. Cryptol., 28 (2): 209-239 (2015)A Practical Attack on KeeLoq., , , , , , , , , и . J. Cryptol., 25 (1): 136-157 (2012)Cryptanalysis of Feistel-Based Format-Preserving Encryption., , , и . IACR Cryptol. ePrint Arch., (2020)A New Criterion for Nonlinearity of Block Ciphers., и . IEEE Trans. Inf. Theory, 53 (11): 3944-3957 (2007)Quantum time/memory/data tradeoff attacks., , , и . Des. Codes Cryptogr., 92 (1): 159-177 (января 2024)A Simple Related-Key Attack on the Full SHACAL-1., , и . CT-RSA, том 4377 из Lecture Notes in Computer Science, стр. 20-30. Springer, (2007)Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities., , , , и . CRYPTO (2), том 10992 из Lecture Notes in Computer Science, стр. 185-212. Springer, (2018)A Unified Approach to Related-Key Attacks., , и . FSE, том 5086 из Lecture Notes in Computer Science, стр. 73-96. Springer, (2008)Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2., , , и . ASIACRYPT (1), том 8269 из Lecture Notes in Computer Science, стр. 337-356. Springer, (2013)