From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Pairing Problem with User Interaction., и . SEC, том 181 из IFIP, стр. 251-266. Springer, (2005)GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption., , , , , и . CHES, том 10529 из Lecture Notes in Computer Science, стр. 321-345. Springer, (2017)On the (In)Security of IDEA in Various Hashing Modes., , , , , и . FSE, том 7549 из Lecture Notes in Computer Science, стр. 163-179. Springer, (2012)Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations., и . FSE, том 6147 из Lecture Notes in Computer Science, стр. 365-383. Springer, (2010)Hash Functions and the (Amplified) Boomerang Attack., и . CRYPTO, том 4622 из Lecture Notes in Computer Science, стр. 244-263. Springer, (2007)Combining Compression Functions and Block Cipher-Based Hash Functions., , , и . ASIACRYPT, том 4284 из Lecture Notes in Computer Science, стр. 315-331. Springer, (2006)Cryptanalysis of JAMBU., , , и . FSE, том 9054 из Lecture Notes in Computer Science, стр. 264-281. Springer, (2015)The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers., и . CRYPTO (3), том 12172 из Lecture Notes in Computer Science, стр. 249-278. Springer, (2020)NeuroGIFT: Using a Machine Learning Based Sat Solver for Cryptanalysis., , , и . CSCML, том 12161 из Lecture Notes in Computer Science, стр. 62-84. Springer, (2020)Improved Cryptanalysis of Reduced RIPEMD-160., , , , и . ASIACRYPT (2), том 8270 из Lecture Notes in Computer Science, стр. 484-503. Springer, (2013)