From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attacking the IPsec Standards in Encryption-only Configurations., и . S&P, стр. 335-349. IEEE Computer Society, (2007)Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results., , , и . CRYPTO (1), том 9814 из Lecture Notes in Computer Science, стр. 403-432. Springer, (2016)Economic aspects of a utility computing service., и . GridNets, стр. 27. ICST, (2007)Untagging Tor: A Formal Treatment of Onion Encryption., и . EUROCRYPT (3), том 10822 из Lecture Notes in Computer Science, стр. 259-293. Springer, (2018)SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields., , , и . SP, стр. 3128-3146. IEEE, (2024)Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation., , , и . IACR Cryptology ePrint Archive, (2015)Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels., и . CRYPTO (4), том 13510 из Lecture Notes in Computer Science, стр. 264-295. Springer, (2022)The Security of ChaCha20-Poly1305 in the Multi-User Setting., , , и . CCS, стр. 1981-2003. ACM, (2021)The Indifferentiability of the Duplex and Its Practical Applications., , и . ASIACRYPT (8), том 14445 из Lecture Notes in Computer Science, стр. 237-269. Springer, (2023)On Symmetric Encryption with Distinguishable Decryption Failures., , , и . FSE, том 8424 из Lecture Notes in Computer Science, стр. 367-390. Springer, (2013)