From post

Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?

, и . ASIACRYPT, том 5912 из Lecture Notes in Computer Science, стр. 487-504. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improved Cryptanalysis of the Multi-Prime φ - Hiding Assumption.. AFRICACRYPT, том 6737 из Lecture Notes in Computer Science, стр. 92-99. Springer, (2011)A Practical Key Recovery Attack on Basic TCHo., и . Public Key Cryptography, том 5443 из Lecture Notes in Computer Science, стр. 411-424. Springer, (2009)