From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Is theoretical cryptography any good in practice. Talk given at CHES, (2010)Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders., , , и . CARDIS, USENIX, (2002)Computational Alternatives to Random Number Generators., , , и . Selected Areas in Cryptography, том 1556 из Lecture Notes in Computer Science, стр. 72-80. Springer, (1998)Statistics and Secret Leakage., , и . Financial Cryptography, том 1962 из Lecture Notes in Computer Science, стр. 157-173. Springer, (2000)Asymmetric Currency Rounding., , и . Financial Cryptography, том 1962 из Lecture Notes in Computer Science, стр. 192-201. Springer, (2000)Trading-Off Type-Inference Memory Complexity against Communication., , , и . ICICS, том 2836 из Lecture Notes in Computer Science, стр. 60-71. Springer, (2003)On the Security of RSA Padding., , и . CRYPTO, том 1666 из Lecture Notes in Computer Science, стр. 1-18. Springer, (1999)Applet Verification Strategiesfor RAM-Constrained Devices., , , и . ICISC, том 2587 из Lecture Notes in Computer Science, стр. 118-137. Springer, (2002)How to Improve an Exponentiation Black-Box., , , и . EUROCRYPT, том 1403 из Lecture Notes in Computer Science, стр. 211-220. Springer, (1998)On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption., , , , и . ACNS, том 6123 из Lecture Notes in Computer Science, стр. 1-18. (2010)