From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Stronger Security Variants of GCM-SIV., и . IACR Trans. Symmetric Cryptol., 2016 (1): 134-157 (2016)Blockcipher-Based Authenticated Encryption: How Small Can We Go?, , , и . CHES, том 10529 из Lecture Notes in Computer Science, стр. 277-298. Springer, (2017)On Maximum Differential Probability of Generalized Feistel., , и . ACISP, том 6812 из Lecture Notes in Computer Science, стр. 89-105. Springer, (2011)Expanding Weak PRF with Small Key Size., и . ICISC, том 3935 из Lecture Notes in Computer Science, стр. 284-298. Springer, (2005)Improved Security Analysis of XEX and LRW Modes.. Selected Areas in Cryptography, том 4356 из Lecture Notes in Computer Science, стр. 96-113. Springer, (2006)Beyond-Birthday-Bound Security Based on Tweakable Block Cipher.. FSE, том 5665 из Lecture Notes in Computer Science, стр. 308-326. Springer, (2009)New Bounds for PMAC, TMAC, and XCBC., и . FSE, том 4593 из Lecture Notes in Computer Science, стр. 434-451. Springer, (2007)A smaller and faster variant of RSM., , , и . DATE, стр. 1-6. European Design and Automation Association, (2014)Fast Decryption: a New Feature of Misuse-Resistant AE.. IACR Trans. Symmetric Cryptol., 2020 (3): 87-118 (2020)Integrity analysis of authenticated encryption based on stream ciphers., , и . Int. J. Inf. Sec., 17 (5): 493-511 (2018)