From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A note on the weak invariance principle for local times, и . Statistics & Probability Letters, 32 (2): 147--159 (01.03.1997)A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures., , и . ICISC, том 2015 из Lecture Notes in Computer Science, стр. 1-13. Springer, (2000)IPCC7: Post-Quantum Encryption Scheme Based on a Perfect Dominating Set in 3-Regular Graph., , , , и . IEEE Access, (2024)Provable Security of KASUMI and 3GPP Encryption Mode f8., , , и . ASIACRYPT, том 2248 из Lecture Notes in Computer Science, стр. 255-271. Springer, (2001)Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST., , , , и . FSE, том 3017 из Lecture Notes in Computer Science, стр. 299-316. Springer, (2004)On Fast Private Scalar Product Protocols., и . FGIT-SecTech, том 259 из Communications in Computer and Information Science, стр. 1-10. Springer, (2011)New Variant of the Self-Shrinking Generator and Its Cryptographic Properties., , , , и . ICISC, том 4296 из Lecture Notes in Computer Science, стр. 41-50. Springer, (2006)New Public-Key Cryptosystem Using Braid Groups., , , , , и . CRYPTO, том 1880 из Lecture Notes in Computer Science, стр. 166-183. Springer, (2000)Probabilistic Analysis for the Relationship Between Min-Entropy and Guessing Attack., , и . CSA/CUTE, том 421 из Lecture Notes in Electrical Engineering, стр. 567-572. Springer, (2016)Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI., , , и . ACISP, том 2119 из Lecture Notes in Computer Science, стр. 60-73. Springer, (2001)