Author of the publication

Revisiting the Karnin, Greene and Hellman Bounds.

, , and . ICITS, volume 5155 of Lecture Notes in Computer Science, page 183-198. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient and Secure Conference-Key Distribution., and . Security Protocols Workshop, volume 1189 of Lecture Notes in Computer Science, page 119-129. Springer, (1996)Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure.. Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, page 53-56. Springer, (2007)VSS Made Simpler., and . IWSEC, volume 11689 of Lecture Notes in Computer Science, page 329-342. Springer, (2019)Several Exhaustive Key Search Machines and DES., , and . EUROCRYPT, page 17-19. (1986)Perfect Anonymity., and . IEEE Trans. Inf. Theory, 65 (6): 3990-3997 (2019)Chinese Lotto as an Exhaustive Code-Breaking Machine., and . Computer, 24 (11): 14-22 (1991)Pseudo-Cryptanalysis of Luffa., , , and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 187-198. Springer, (2010)Cryptography: How to Attack, What to Protect?, , and . ICC (1), page 175-178. Elsevier, (1984)Threshold Cryptosystems., and . CRYPTO, volume 435 of Lecture Notes in Computer Science, page 307-315. Springer, (1989)Dependence of Output on Input in DES: Small Avalanche Characteristics., , and . CRYPTO, volume 196 of Lecture Notes in Computer Science, page 359-376. Springer, (1984)