Author of the publication

On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography.

. CISC, volume 3822 of Lecture Notes in Computer Science, page 1-9. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimization of the MOVA Undeniable Signature Scheme., , and . Mycrypt, volume 3715 of Lecture Notes in Computer Science, page 196-209. Springer, (2005)Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges., and . ProvSec, volume 8209 of Lecture Notes in Computer Science, page 121-138. Springer, (2013)An Experiment on DES Statistical Cryptanalysis.. ACM Conference on Computer and Communications Security, page 139-147. ACM, (1996)How to Sequentialize Independent Parallel Attacks?, and . IACR Cryptology ePrint Archive, (2016)The Newton Channel., , , and . Information Hiding, volume 1174 of Lecture Notes in Computer Science, page 151-156. Springer, (1996)On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography.. CISC, volume 3822 of Lecture Notes in Computer Science, page 1-9. Springer, (2005)Feistel Ciphers with L2-Decorrelation.. Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 1-14. Springer, (1998)Timed-Release Encryption with Master Time Bound Key., and . WISA, volume 11897 of Lecture Notes in Computer Science, page 167-179. Springer, (2019)Computational Alternatives to Random Number Generators, , , and . Fifth Annual Workshop on Selected Areas in Cryptography, SAC'98, volume 1556 of Lecture Notes in Computer Science, page 72--80. Springer, (1999)Clever Arbiters Versus Malicious Adversaries - On the Gap Between Known-Input Security and Chosen-Input Security.. The New Codebreakers, volume 9100 of Lecture Notes in Computer Science, page 497-517. Springer, (2016)