Author of the publication

On the Development of the Advanced Encryption Standard.

. SEC, volume 175 of IFIP Conference Proceedings, page 503-504. Kluwer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Methods for Integrating Traceability and Broadcast Encryption., , and . CRYPTO, volume 1666 of Lecture Notes in Computer Science, page 372-387. Springer, (1999)Efficient Collision Search Attacks on SHA-0., , and . CRYPTO, volume 3621 of Lecture Notes in Computer Science, page 1-16. Springer, (2005)Being Taught can be Faster than Asking Questions., and . COLT, page 144-151. ACM, (1995)On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm., and . CRYPTO, volume 963 of Lecture Notes in Computer Science, page 171-184. Springer, (1995)Storage-Efficient Finite Field Basis Conversion., and . Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 81-93. Springer, (1998)Optimal Constructions of Hybrid Algorithms., , , and . SODA, page 372-381. ACM/SIAM, (1994)Reducing the Number of Queries in Self-Directed Learning.. COLT, page 128-135. ACM, (1995)Fast Software-Based Attacks on SecurID., and . FSE, volume 3017 of Lecture Notes in Computer Science, page 454-471. Springer, (2004)Looking Back at a New Hash Function., , , and . ACISP, volume 5107 of Lecture Notes in Computer Science, page 239-253. Springer, (2008)Efficient Software Implementation for Finite Field Multiplication in Normal Basis., and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 177-188. Springer, (2001)