From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On a Resynchronization Weakness in a Class of Combiners with Memory., , , и . SCN, том 2576 из Lecture Notes in Computer Science, стр. 164-173. Springer, (2002)Information Authentication: Hash Functions and Digital Signatures., , и . Computer Security and Industrial Cryptography, том 741 из Lecture Notes in Computer Science, стр. 87-131. Springer, (1991)Kernel Canonical Correlation Analysis and Least Squares Support Vector Machines., , , , и . ICANN, том 2130 из Lecture Notes in Computer Science, стр. 384-389. Springer, (2001)SHA: A Design for Parallel Architectures?, , и . EUROCRYPT, том 1233 из Lecture Notes in Computer Science, стр. 348-362. Springer, (1997)New Weak-Key Classes of IDEA., , , и . ICICS, том 2513 из Lecture Notes in Computer Science, стр. 315-326. Springer, (2002)Secure Communication for Secure Agent-Based Electronic Commerce Applications., , и . E-Commerce Agents, том 2033 из Lecture Notes in Computer Science, стр. 180-190. Springer, (2001)A new inequality in discrete Fourier theory., , и . IEEE Trans. Inf. Theory, 49 (8): 2038-2040 (2003)A Hardware Design Model for Cryptographic Algorithms., , и . ESORICS, том 648 из Lecture Notes in Computer Science, стр. 419-434. Springer, (1992)An Attack on Two Hash Functions by Zheng-Matsumoto-Imai., , и . AUSCRYPT, том 718 из Lecture Notes in Computer Science, стр. 535-538. Springer, (1992)SVD-based methodologies for fetal electrocardiogram extraction., , и . ICASSP, стр. 3771-3774. IEEE, (2000)