From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia., , и . J. Comput. Sci. Technol., 22 (3): 449-456 (2007)Improved Integral Cryptanalysis of FOX Block Cipher., , и . IACR Cryptology ePrint Archive, (2005)Impossible Differential Cryptanalysis of ARIA and Camellia., , и . IACR Cryptology ePrint Archive, (2006)Integral Cryptanalysis of Reduced FOX Block Cipher., , и . ICISC, том 3935 из Lecture Notes in Computer Science, стр. 229-241. Springer, (2005)Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192., , , и . Selected Areas in Cryptography, том 4356 из Lecture Notes in Computer Science, стр. 15-27. Springer, (2006)Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha., , , и . ICISC, том 7839 из Lecture Notes in Computer Science, стр. 337-351. Springer, (2012)Another Look at PMAC., , и . Int. J. Netw. Secur., 5 (1): 16-20 (2007)Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z2l., , и . IEEE Trans. Inf. Theory, 52 (5): 2260-2265 (2006)A Variant of Poly1305 MAC and Its Security Proof., , и . CIS (2), том 3802 из Lecture Notes in Computer Science, стр. 375-380. Springer, (2005)Error Oracle Attacks on Several Modes of Operation., , и . CIS (2), том 3802 из Lecture Notes in Computer Science, стр. 62-67. Springer, (2005)