Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Making family-centred care a reality.. Nurs N Z, 5 (4): 14--16 (May 1999)Cryptanalysis of PRESENT-like ciphers with secret S-boxes., , , and . IACR Cryptology ePrint Archive, (2010)Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography., , and . ACNS, volume 5037 of Lecture Notes in Computer Science, page 144-155. (2008)Practical Near-Collisions on the Compression Function of BMW., and . FSE, volume 6733 of Lecture Notes in Computer Science, page 238-251. Springer, (2011)Ethnomethodology and the study of online communities: exploring the cyber streets, , and . Information research, 4 (1): 4–1 (1998)Rebound Attacks on the Reduced Grøstl Hash Function., , , and . CT-RSA, volume 5985 of Lecture Notes in Computer Science, page 350-365. Springer, (2010)Proposals for Iterated Hash Functions., and . ICETE (Selected Papers), volume 9 of Communications in Computer and Information Science, page 107-118. (2006)Pseudo-cryptanalysis of the Original Blue Midnight Wish.. FSE, volume 6147 of Lecture Notes in Computer Science, page 304-317. Springer, (2010)Cryptanalysis of MDC-2., , , and . EUROCRYPT, volume 5479 of Lecture Notes in Computer Science, page 106-120. Springer, (2009)Thermodynamic Derivatives without Tables. American Journal of Physics, 32 (9): 666-671 (1964)