From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A New Ultrafast Stream Cipher Design: COS Ciphers., и . IMACC, том 2260 из Lecture Notes in Computer Science, стр. 85-98. Springer, (2001)Better security levels for broken arrows., , и . Media Forensics and Security, том 7541 из SPIE Proceedings, стр. 75410H. SPIE, (2010)Towards robust and secure watermarking., , и . MM&Sec, стр. 153-160. ACM, (2010)COS Ciphers are not "extremely weak"! - The Design Rationale of COS Ciphers., и . IACR Cryptology ePrint Archive, (2001)New results about Tu-Deng's conjecture., , и . ISIT, стр. 485-489. IEEE, (2016)A note on Ring-LWE security in the case of Fully Homomorphic Encryption., и . IACR Cryptology ePrint Archive, (2016)A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols., , и . SP, стр. 125-141. IEEE, (2022)Highly Nonlinear Balanced Boolean Functions with a Good Correlation-Immunity., и . EUROCRYPT, том 1403 из Lecture Notes in Computer Science, стр. 475-488. Springer, (1998)Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions., , , и . EUROCRYPT, том 1807 из Lecture Notes in Computer Science, стр. 507-522. Springer, (2000)Links between cryptography and information hiding., и . Security and Watermarking of Multimedia Contents, том 4675 из SPIE Proceedings, стр. 269-280. SPIE, (2002)