From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Implementation and Evaluation of an Identity-Based Encryption with Security Against the KGC., , , и . CANDAR (Workshops), стр. 320-325. IEEE, (2021)Output Prediction Attacks on Block Ciphers Using Deep Learning., , , , , и . ACNS Workshops, том 13285 из Lecture Notes in Computer Science, стр. 248-276. Springer, (2022)A Generic Construction of Integrated Secure-Channel Free PEKS and PKE., , и . ISPEC, том 11125 из Lecture Notes in Computer Science, стр. 69-86. Springer, (2018)Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations., , , и . Comput. J., 62 (4): 614-630 (2019)Detecting Fake QR Codes Using Information from Error-Correction., , , , , , , , , и 2 other автор(ы). J. Inf. Process., (2021)FMS Attack-Resistant WEP Implementation Is Still Broken., , и . CIS (2), том 3802 из Lecture Notes in Computer Science, стр. 17-26. Springer, (2005)Neural-Network-Based Pseudo-Random Number Generator Evaluation Tool for Stream Ciphers., , и . CANDAR Workshops, стр. 333-338. IEEE, (2019)Verifiable Functional Encryption using Intel SGX., , , и . IACR Cryptol. ePrint Arch., (2020)Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets., , , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (1): 164-171 (2010)Expanding Weak-key Space of RC4., , , и . J. Inf. Process., 22 (2): 357-365 (2014)