From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Generalization and Extension of XEX* Mode., и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (2): 517-524 (2009)Fast Decryption: a New Feature of Misuse-Resistant AE.. IACR Trans. Symmetric Cryptol., 2020 (3): 87-118 (2020)Integrity analysis of authenticated encryption based on stream ciphers., , и . Int. J. Inf. Sec., 17 (5): 493-511 (2018)Stronger Security Variants of GCM-SIV., и . IACR Trans. Symmetric Cryptol., 2016 (1): 134-157 (2016)A smaller and faster variant of RSM., , , и . DATE, стр. 1-6. European Design and Automation Association, (2014)XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation., , , , , и . EUROCRYPT (4), том 14007 из Lecture Notes in Computer Science, стр. 532-561. Springer, (2023)Improved Security Analysis of XEX and LRW Modes.. Selected Areas in Cryptography, том 4356 из Lecture Notes in Computer Science, стр. 96-113. Springer, (2006)Breaking Message Integrity of an End-to-End Encryption Scheme of LINE., и . ESORICS (2), том 11099 из Lecture Notes in Computer Science, стр. 249-268. Springer, (2018)Blockcipher-Based Authenticated Encryption: How Small Can We Go?, , , и . CHES, том 10529 из Lecture Notes in Computer Science, стр. 277-298. Springer, (2017)Beyond-Birthday-Bound Security Based on Tweakable Block Cipher.. FSE, том 5665 из Lecture Notes in Computer Science, стр. 308-326. Springer, (2009)