From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security of Jump Controlled Sequence Generators for Stream Ciphers., , , и . SETA, том 4086 из Lecture Notes in Computer Science, стр. 141-152. Springer, (2006)Reduced Complexity Attacks on the Alternating Step Generator., , и . Selected Areas in Cryptography, том 4876 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2007)Optimal linear secret sharing schemes for graph access structures on six participants., и . Theor. Comput. Sci., (2019)Reduced access structures with four minimal qualified subsets on six participants., и . Adv. in Math. of Comm., 12 (1): 199-214 (2018)On Reconstruction of RC4 Keys from Internal States., и . MMICS, том 5393 из Lecture Notes in Computer Science, стр. 179-189. Springer, (2008)Partial Secret Sharing Schemes., и . IACR Cryptology ePrint Archive, (2020)Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT., , , и . Wirel. Pers. Commun., 95 (4): 5057-5080 (2017)Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers., , и . IACR Cryptology ePrint Archive, (2006)New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers., и . INDOCRYPT, том 5365 из Lecture Notes in Computer Science, стр. 15-26. Springer, (2008)Improved Linear Differential Attacks on CubeHash., , , и . AFRICACRYPT, том 6055 из Lecture Notes in Computer Science, стр. 407-418. Springer, (2010)