From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Quantum Linearization Attacks., , , и . ASIACRYPT (1), том 13090 из Lecture Notes in Computer Science, стр. 422-452. Springer, (2021)New Attacks from Old Distinguishers Improved Attacks on Serpent., , , , , , и . CT-RSA, том 13161 из Lecture Notes in Computer Science, стр. 484-510. Springer, (2022)Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to the Light., , , , , и . CRYPTO (3), том 12172 из Lecture Notes in Computer Science, стр. 359-388. Springer, (2020)Quantum Attacks Without Superposition Queries: The Offline Simon's Algorithm., , , , и . ASIACRYPT (1), том 11921 из Lecture Notes in Computer Science, стр. 552-583. Springer, (2019)Practical Cryptanalysis of ARMADILLO2., и . FSE, том 7549 из Lecture Notes in Computer Science, стр. 146-162. Springer, (2012)QCB: Efficient Quantum-secure Authenticated Encryption., , , , , , и . IACR Cryptol. ePrint Arch., (2020)Cryptanalysis of ESSENCE., , , , , , и . IACR Cryptology ePrint Archive, (2009)Cryptanalyse de Achterbahn-128/80. CoRR, (2006)How to Improve Rebound Attacks.. CRYPTO, том 6841 из Lecture Notes in Computer Science, стр. 188-205. Springer, (2011)Cryptanalysis of Luffa v2 Components., , , и . Selected Areas in Cryptography, том 6544 из Lecture Notes in Computer Science, стр. 388-409. Springer, (2010)