From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform., , , , и . ICICS, том 5927 из Lecture Notes in Computer Science, стр. 3-16. Springer, (2009)A Fast Modular Arithmetic Algorithm Using a Residue Table (Extended Abstract)., и . EUROCRYPT, том 330 из Lecture Notes in Computer Science, стр. 245-250. Springer, (1988)Implementation of RSA Algorithm Based on RNS Montgomery Multiplication., , , и . CHES, том 2162 из Lecture Notes in Computer Science, стр. 364-376. Springer, (2001)Cryptanalysis of Several Conference Key Distribution Schemes., и . ASIACRYPT, том 739 из Lecture Notes in Computer Science, стр. 265-276. Springer, (1991)Formal Security Model of Multisignatures., , , и . ISC, том 4176 из Lecture Notes in Computer Science, стр. 146-160. Springer, (2006)Toward the Fair Anonymous Signatures: Deniable Ring Signatures., , , и . CT-RSA, том 3860 из Lecture Notes in Computer Science, стр. 174-191. Springer, (2006)The Block Cipher Hierocrypt., , , и . Selected Areas in Cryptography, том 2012 из Lecture Notes in Computer Science, стр. 72-88. Springer, (2000)Special Section on Cryptography and Information Security.. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (1): 1 (2006)Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (1): 191-199 (2011)Fast Server-Aided Secret Computation Protocols for Modular Exponentiation., и . IEEE J. Sel. Areas Commun., 11 (5): 778-784 (1993)