From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1., , и . ICISC, том 5984 из Lecture Notes in Computer Science, стр. 349-361. Springer, (2009)New Birthday Attacks on Some MACs Based on Block Ciphers., , , , и . CRYPTO, том 5677 из Lecture Notes in Computer Science, стр. 209-230. Springer, (2009)Pseudo-Cryptanalysis of Luffa., , , и . Inscrypt, том 6584 из Lecture Notes in Computer Science, стр. 187-198. Springer, (2010)Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes., , , и . Sci. China Inf. Sci., (2021)Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule., , , , и . IACR Cryptol. ePrint Arch., (2019)Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny., , , , и . IACR Trans. Symmetric Cryptol., 2021 (2): 249-291 (2021)New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect., , и . IACR Trans. Symmetric Cryptol., 2019 (3): 121-151 (2019)Improved Attacks on Reduced-Round Camellia-128/192/256., , , и . CT-RSA, том 9048 из Lecture Notes in Computer Science, стр. 59-83. Springer, (2015)Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512., и . ISPEC, том 6047 из Lecture Notes in Computer Science, стр. 1-18. Springer, (2010)Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak., , , , и . IACR Cryptol. ePrint Arch., (2019)