From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers., , , , , , и . J. Cryptol., 19 (4): 441-462 (2006)Amplified Boomerang Attack against Reduced-Round SHACAL., , , , , и . ASIACRYPT, том 2501 из Lecture Notes in Computer Science, стр. 243-253. Springer, (2002)Unlimited-Vocabulary Grapheme-to-Morpheme Conversion for Korean TTS, , , и . Proceedings of ACL-COLING 98, стр. 675--679. (1998)An Event Detection Service for Spatio-temporal Applications., , , , и . W2GIS, том 4295 из Lecture Notes in Computer Science, стр. 22-30. Springer, (2006)Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA., , , , , и . INDOCRYPT, том 3348 из Lecture Notes in Computer Science, стр. 328-342. Springer, (2004)Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA., , , , и . FSE, том 2365 из Lecture Notes in Computer Science, стр. 49-60. Springer, (2002)Services-Oriented Computing in a Ubiquitous Computing Platform., , , и . ICSOC, том 4294 из Lecture Notes in Computer Science, стр. 601-612. Springer, (2006)New Parallel Domain Extenders for UOWHF., , , , и . ASIACRYPT, том 2894 из Lecture Notes in Computer Science, стр. 208-227. Springer, (2003)Differential Cryptanalysis of TEA and XTEA., , , , , и . ICISC, том 2971 из Lecture Notes in Computer Science, стр. 402-417. Springer, (2003)A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks., , , , , и . CoRR, (2023)