Author of the publication

Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000.

, and . ACISP, volume 2119 of Lecture Notes in Computer Science, page 15-20. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Meet in the Middle Attack on Reduced Round Kuznyechik., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (10): 2194-2198 (2015)Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions., , , , and . ACSAC, page 69-83. ACM, (2020)An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers., and . CCECE, page 1582-1585. IEEE, (2006)A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem., and . ARES, page 402-409. IEEE Computer Society, (2012)Cryptanalysis of a Public Key Encryption Scheme Using Ergodic Matrices., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (2): 853-854 (2011)Mjolnir: Breaking the Glass in a Publicly Verifiable Yet Private Manner., , and . IEEE Trans. Netw. Serv. Manag., 20 (3): 2942-2956 (September 2023)Secrecy Performance in Ultra-Dense Networks with Multiple Associations., , and . GLOBECOM (Workshops), page 1-6. IEEE, (2020)Horus: A Security Assessment Framework for Android Crypto Wallets., , and . SecureComm (2), volume 399 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 120-139. Springer, (2021)Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps., , and . ESORICS Workshops (1), volume 14398 of Lecture Notes in Computer Science, page 232-248. Springer, (2023)Parental Controls: Safer Internet Solutions or New Pitfalls?, , , , and . IEEE Secur. Priv., 19 (6): 36-46 (2021)