From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A smaller and faster variant of RSM., , , и . DATE, стр. 1-6. European Design and Automation Association, (2014)Breaking Message Integrity of an End-to-End Encryption Scheme of LINE., и . ESORICS (2), том 11099 из Lecture Notes in Computer Science, стр. 249-268. Springer, (2018)Generalization and Extension of XEX* Mode., и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (2): 517-524 (2009)Fast Decryption: a New Feature of Misuse-Resistant AE.. IACR Trans. Symmetric Cryptol., 2020 (3): 87-118 (2020)XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation., , , , , и . EUROCRYPT (4), том 14007 из Lecture Notes in Computer Science, стр. 532-561. Springer, (2023)Integrity Analysis of Authenticated Encryption Based on Stream Ciphers., , и . ProvSec, том 10005 из Lecture Notes in Computer Science, стр. 257-276. (2016)Integrity analysis of authenticated encryption based on stream ciphers., , и . Int. J. Inf. Sec., 17 (5): 493-511 (2018)Beyond-Birthday-Bound Security Based on Tweakable Block Cipher.. FSE, том 5665 из Lecture Notes in Computer Science, стр. 308-326. Springer, (2009)New Bounds for PMAC, TMAC, and XCBC., и . FSE, том 4593 из Lecture Notes in Computer Science, стр. 434-451. Springer, (2007)Expanding Weak PRF with Small Key Size., и . ICISC, том 3935 из Lecture Notes in Computer Science, стр. 284-298. Springer, (2005)