From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Algebraic analysis of Trivium-like ciphers (Poster)., , , , и . AISC, том 149 из CRPIT, стр. 77-81. Australian Computer Society, (2014)Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS., , , , , и . TrustCom/BigDataSE/ICESS, стр. 961-966. IEEE Computer Society, (2017)Jacobi Quartic Curves Revisited., , , и . ACISP, том 5594 из Lecture Notes in Computer Science, стр. 452-468. Springer, (2009)Twisted Edwards Curves Revisited., , , и . ASIACRYPT, том 5350 из Lecture Notes in Computer Science, стр. 326-343. Springer, (2008)An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks., , и . AISC, том 105 из CRPIT, стр. 67-74. Australian Computer Society, (2010)Algebraic Attacks on Grain-Like Keystream Generators., , , и . ICISC, том 13218 из Lecture Notes in Computer Science, стр. 241-270. Springer, (2021)Avoiding Full Extension Field Arithmetic in Pairing Computations., , , и . AFRICACRYPT, том 6055 из Lecture Notes in Computer Science, стр. 203-224. Springer, (2010)Forgery attacks on ++AE authenticated encryption mode., , , , и . ACSW, стр. 33. ACM, (2016)Finding state collisions in the authenticated encryption stream cipher ACORN., , , , , и . ACSW, стр. 36. ACM, (2016)A Fault-based Attack on AEZ v4.2., , , , и . TrustCom/BigDataSE/ICESS, стр. 634-641. IEEE Computer Society, (2017)