From post

Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory.

, , , и . ASIACRYPT (3), том 14440 из Lecture Notes in Computer Science, стр. 3-33. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

3-D Data Storage, Power Delivery, and RF/Optical Transceiver - Case Studies of 3-D Integration From System Design Perspectives., , , , и . Proc. IEEE, 97 (1): 161-174 (2009)Lattice-based threshold cryptography and its applications in distributed cloud computing., и . IJHPCN, 8 (2): 176-185 (2015)Cryptanalysis of JAMBU., , , и . FSE, том 9054 из Lecture Notes in Computer Science, стр. 264-281. Springer, (2015)Differential Cryptanalysis of Round-Reduced SPEEDY Family., , , и . Inscrypt, том 13837 из Lecture Notes in Computer Science, стр. 272-291. Springer, (2022)Aggregate and Separate of Signatures in Wireless Network., и . AINA Workshops, стр. 428-433. IEEE Computer Society, (2008)Practical Threshold One-Time Proxy Signature Scheme.. AINA Workshops, стр. 275-279. IEEE Computer Society, (2010)Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory., , , и . ASIACRYPT (3), том 14440 из Lecture Notes in Computer Science, стр. 3-33. Springer, (2023)How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers., , , , и . ASIACRYPT (1), том 10031 из Lecture Notes in Computer Science, стр. 455-483. (2016)Embedded Built-In-Test Detection Circuit for Radio Frequency Systems and Circuits., и . DDECS, стр. 89-90. IEEE Computer Society, (2006)A Secure Threshold Signature Scheme from Lattices., , и . CIS, стр. 469-473. IEEE Computer Society, (2013)