From post

When Stream Cipher Analysis Meets Public-Key Cryptography.

, и . Selected Areas in Cryptography, том 4356 из Lecture Notes in Computer Science, стр. 266-284. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

When Stream Cipher Analysis Meets Public-Key Cryptography., и . Selected Areas in Cryptography, том 4356 из Lecture Notes in Computer Science, стр. 266-284. Springer, (2006)Private Stream Search at Almost the Same Communication Cost as a Regular Search., и . Selected Areas in Cryptography, том 7707 из Lecture Notes in Computer Science, стр. 372-389. Springer, (2012)Syndrome Based Collision Resistant Hashing.. PQCrypto, том 5299 из Lecture Notes in Computer Science, стр. 137-147. Springer, (2008)NP-completeness of Certain Sub-classes of the Syndrome Decoding Problem. CoRR, (2009)TCHo: A Hardware-Oriented Trapdoor Cipher., , , и . ACISP, том 4586 из Lecture Notes in Computer Science, стр. 184-199. Springer, (2007)Private Stream Search at the same communication cost as a regular search: Role of LDPC codes., и . ISIT, стр. 2556-2560. IEEE, (2012)A Control of Smooth Deformations with Topological Change on Polyhedral Mesh Based on Curves and Loops., и . Shape Modeling International, стр. 191-200. IEEE Computer Society, (2002)Dial C for Cipher., и . Selected Areas in Cryptography, том 4356 из Lecture Notes in Computer Science, стр. 76-95. Springer, (2006)Parallel-CFS - Strengthening the CFS McEliece-Based Signature Scheme.. Selected Areas in Cryptography, том 6544 из Lecture Notes in Computer Science, стр. 159-170. Springer, (2010)How to Achieve a McEliece-Based Digital Signature Scheme., , и . ASIACRYPT, том 2248 из Lecture Notes in Computer Science, стр. 157-174. Springer, (2001)