From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher., , , и . INDOCRYPT, том 7668 из Lecture Notes in Computer Science, стр. 244-264. Springer, (2012)Security analysis of the full-round DDO-64 block cipher., , , , и . J. Syst. Softw., 81 (12): 2328-2335 (2008)Speeding Up LAT: Generating a Linear Approximation Table Using a Bitsliced Implementation., , и . IEEE Access, (2022)Methods for decrypting the data encrypted by the latest Samsung smartphone backup programs in Windows and macOS., , , и . Digit. Investig., (2021)An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks., , , , и . J. Supercomput., 70 (1): 224-235 (2014)The Related-Key Rectangle Attack - Application to SHACAL-1., , , , и . ACISP, том 3108 из Lecture Notes in Computer Science, стр. 123-136. Springer, (2004)Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL., , , , и . FSE, том 5086 из Lecture Notes in Computer Science, стр. 189-206. Springer, (2008)Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant., , , , и . ACISP, том 4058 из Lecture Notes in Computer Science, стр. 421-431. Springer, (2006)Study on the security of the extended version for the ISO/IEC international standardized block cipher SEED.. Secur. Commun. Networks, 5 (10): 1141-1146 (2012)Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds., , , и . WEWoRC, том P-74 из LNI, стр. 64-75. GI, (2005)