From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Higher Order Differential Attacks on Reduced-Round MISTY1., , , и . ICISC, том 5461 из Lecture Notes in Computer Science, стр. 415-431. Springer, (2008)A Single-Key Attack on 6-Round KASUMI.. IACR Cryptology ePrint Archive, (2011)Cryptanalysis of DES Implemented on Computers with Cache., , , , и . CHES, том 2779 из Lecture Notes in Computer Science, стр. 62-76. Springer, (2003)Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV., , , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (4): 799-807 (2010)Impossible Differential Cryptanalysis of CLEFIA., , , , , и . FSE, том 5086 из Lecture Notes in Computer Science, стр. 398-411. Springer, (2008)A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher., , , и . IEEE Trans. Inf. Theory, 53 (9): 3250-3255 (2007)Distinguishing Attack Against TPypy., , , и . Selected Areas in Cryptography, том 4876 из Lecture Notes in Computer Science, стр. 396-407. Springer, (2007)Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box., , , и . ICICS, том 5308 из Lecture Notes in Computer Science, стр. 128-140. Springer, (2008)Shorter bit sequence is enough to break stream cipher LILI-128., , , , и . IEEE Trans. Inf. Theory, 51 (12): 4312-4319 (2005)