From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Clever Arbiters Versus Malicious Adversaries - On the Gap Between Known-Input Security and Chosen-Input Security.. The New Codebreakers, том 9100 из Lecture Notes in Computer Science, стр. 497-517. Springer, (2016)Boosting OMD for Almost Free Authentication of Associated Data., , и . FSE, том 9054 из Lecture Notes in Computer Science, стр. 411-427. Springer, (2015)Timed-Release Encryption with Master Time Bound Key., и . WISA, том 11897 из Lecture Notes in Computer Science, стр. 167-179. Springer, (2019)Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges., и . ProvSec, том 8209 из Lecture Notes in Computer Science, стр. 121-138. Springer, (2013)The Newton Channel., , , и . Information Hiding, том 1174 из Lecture Notes in Computer Science, стр. 151-156. Springer, (1996)ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware., , , , , , , и . CHES, том 6225 из Lecture Notes in Computer Science, стр. 398-412. Springer, (2010)On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography.. CISC, том 3822 из Lecture Notes in Computer Science, стр. 1-9. Springer, (2005)Optimization of the MOVA Undeniable Signature Scheme., , и . Mycrypt, том 3715 из Lecture Notes in Computer Science, стр. 196-209. Springer, (2005)Feistel Ciphers with L2-Decorrelation.. Selected Areas in Cryptography, том 1556 из Lecture Notes in Computer Science, стр. 1-14. Springer, (1998)Distance Bounding Based on PUF., и . CANS, том 10052 из Lecture Notes in Computer Science, стр. 701-710. (2016)