From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

New Constructions of MACs from (Tweakable) Block Ciphers., , и . IACR Trans. Symmetric Cryptol., 2017 (2): 27-58 (2017)Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds., , и . IACR Cryptol. ePrint Arch., (2022)Rubato: Noisy Ciphers for Approximate Homomorphic Encryption., , , , и . EUROCRYPT (1), том 13275 из Lecture Notes in Computer Science, стр. 581-610. Springer, (2022)A model for recursive propagations of reputations in social networks., и . ASONAM, стр. 666-670. ACM, (2013)Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation., и . IEEE Trans. Inf. Theory, 58 (9): 6165-6182 (2012)Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes., , , , и . FSE, том 9054 из Lecture Notes in Computer Science, стр. 319-341. Springer, (2015)The Security of Tandem-DM in the Ideal Cipher Model., , и . J. Cryptol., 30 (2): 495-518 (2017)Evolution of physics-based methodology for exploring the conformational energy landscape of proteins., , , , , , , и . J. Comput. Chem., 23 (1): 28-34 (2002)Robust Sound-Guided Image Manipulation., , , , , , , и . CoRR, (2022)Restoration of Extremely Compressed Background for VCM Using Guided Generative Priors., , , , и . ICIP, стр. 1190-1194. IEEE, (2023)