From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity., и . IWSEC, том 11689 из Lecture Notes in Computer Science, стр. 343-362. Springer, (2019)How to Sequentialize Independent Parallel Attacks?, и . IACR Cryptology ePrint Archive, (2016)An Experiment on DES Statistical Cryptanalysis.. ACM Conference on Computer and Communications Security, стр. 139-147. ACM, (1996)On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography.. CISC, том 3822 из Lecture Notes in Computer Science, стр. 1-9. Springer, (2005)ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware., , , , , , , и . CHES, том 6225 из Lecture Notes in Computer Science, стр. 398-412. Springer, (2010)The Newton Channel., , , и . Information Hiding, том 1174 из Lecture Notes in Computer Science, стр. 151-156. Springer, (1996)Feistel Ciphers with L2-Decorrelation.. Selected Areas in Cryptography, том 1556 из Lecture Notes in Computer Science, стр. 1-14. Springer, (1998)Sound Proof of Proximity of Knowledge.. ProvSec, том 9451 из Lecture Notes in Computer Science, стр. 105-126. Springer, (2015)On Privacy for RFID.. ProvSec, том 9451 из Lecture Notes in Computer Science, стр. 3-20. Springer, (2015)Optimization of the MOVA Undeniable Signature Scheme., , и . Mycrypt, том 3715 из Lecture Notes in Computer Science, стр. 196-209. Springer, (2005)