From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Collision and Preimage Resistance of Certain Two-Call Hash Functions., , , и . CANS, том 6467 из Lecture Notes in Computer Science, стр. 96-105. Springer, (2010)Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks., и . CT-RSA, том 4964 из Lecture Notes in Computer Science, стр. 36-51. Springer, (2008)EPC: A Provably Secure Permutation Based Compression Function., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (10): 1833-1836 (2010)Cryptographic Hash Functions., и . Handbook of Information and Communication Security, Springer, (2010)BloomXNOR-Net: privacy-preserving machine learning in IoT., , , , и . S3@MobiCom, стр. 1-3. ACM, (2022)On the Security of Two RFID Mutual Authentication Protocols., , , , и . RFIDSec, том 8262 из Lecture Notes in Computer Science, стр. 86-99. Springer, (2013)Improved Attack on the Cellular Authentication and Voice Encryption Algorithm (CAVE)., и . Cryptographic Algorithms and their Uses, стр. 1-13. Queensland University of Technology, (2004)CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique., , и . Cryptographic Algorithms and their Uses, стр. 28-39. Queensland University of Technology, (2004)Linear Cryptanalysis of Round Reduced SIMON., , , , и . IACR Cryptology ePrint Archive, (2013)Vulnerability Database as a Service for IoT., , , и . ATIS, том 1338 из Communications in Computer and Information Science, стр. 95-107. Springer, (2020)