From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security analysis of contactless communication protocols. (Analyse de sécurité des protocoles de communication sans contact).. University of Clermont Auvergne, Clermont-Ferrand, France, (2018)A Cipher-Agnostic Neural Training Pipeline with Automated Finding of Good Input Differences., , , и . IACR Cryptol. ePrint Arch., (2022)Verifiable and Private Oblivious Polynomial Evaluation., , , , и . WISTP, том 12024 из Lecture Notes in Computer Science, стр. 49-65. Springer, (2019)Towards Secure TMIS Protocols., и . FPS, том 12056 из Lecture Notes in Computer Science, стр. 337-344. Springer, (2019)Analysis of AES, SKINNY, and Others with Constraint Programming., , , , , , и . IACR Cryptol. ePrint Arch., (2017)Distance bounding under different assumptions: opinion., и . WiSec, стр. 245-248. ACM, (2019)Exploring Differential-Based Distinguishers and Forgeries for ASCON., , и . IACR Trans. Symmetric Cryptol., 2021 (3): 102-136 (2021)A Deeper Look at Machine Learning-Based Cryptanalysis., , , и . EUROCRYPT (1), том 12696 из Lecture Notes in Computer Science, стр. 805-835. Springer, (2021)Monte Carlo Tree Search for automatic differential characteristics search: application to SPECK., , , и . IACR Cryptol. ePrint Arch., (2024)Fully Automated Differential-Linear Attacks Against ARX Ciphers., , , , и . CT-RSA, том 13871 из Lecture Notes in Computer Science, стр. 252-276. Springer, (2023)