From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secure Two-Party Computation with Low Communication., , и . IACR Cryptology ePrint Archive, (2011)A Tamper and Leakage Resilient von Neumann Architecture., , , и . Public Key Cryptography, том 9020 из Lecture Notes in Computer Science, стр. 579-603. Springer, (2015)A Formal Treatment of Deterministic Wallets., , и . ACM Conference on Computer and Communications Security, стр. 651-668. ACM, (2019)Unifying Leakage Models: From Probing Attacks to Noisy Leakage., , и . J. Cryptol., 32 (1): 151-177 (2019)Long Paper: Provable Secure Parallel Gadgets., , и . IACR Cryptol. ePrint Arch., (2023)Leakage-Resilient Cryptography From the Inner-Product Extractor., и . IACR Cryptol. ePrint Arch., (2011)Inner Product Masking Revisited., , и . EUROCRYPT (1), том 9056 из Lecture Notes in Computer Science, стр. 486-510. Springer, (2015)Financially Backed Covert Security., , , и . Public Key Cryptography (2), том 13178 из Lecture Notes in Computer Science, стр. 99-129. Springer, (2022)On the Related-Key Attack Security of Authenticated Encryption Schemes., , , и . SCN, том 13409 из Lecture Notes in Computer Science, стр. 362-386. Springer, (2022)Individual Cryptography., , и . CRYPTO (2), том 14082 из Lecture Notes in Computer Science, стр. 547-579. Springer, (2023)