From post

Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property.

, , , , и . MMM-ACNS, том 2776 из Lecture Notes in Computer Science, стр. 298-307. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Engineering microbial phenotypes through rewiring of genetic networks., , , , и . Nucleic acids research, 45 (8): 4984--4993 (05.05.2017)Conditional Correlation Attack on Nonlinear Filter Generators., , , и . ASIACRYPT, том 1163 из Lecture Notes in Computer Science, стр. 360-367. Springer, (1996)Extrapolative-Interpolative Cycle-Consistency Learning For Video Frame Extrapolation., , , и . ICIP, стр. 1571-1575. IEEE, (2020)A New Primitive For Stream Ciphers Applicable To Pervasive Environments., , и . Intell. Autom. Soft Comput., 16 (3): 461-470 (2010)Data fragment forensics for embedded DVR systems., и . Digit. Investig., 11 (3): 187-200 (2014)Vision: An empirical framework for examiners to accessing password-protected resources for on-the-scene digital investigations., , и . Digit. Investig., 40 (Supplement): 301376 (2022)Forensic investigation of Microsoft PowerPoint files., и . Digit. Investig., 6 (1-2): 16-24 (2009)Forensic analysis of SQL server transaction log in unallocated area of file system., и . Forensic Sci. Int. Digit. Investig., 46 (Supplement): 301605 (октября 2023)An enhanced security framework for reliable Android operating system., , , и . Secur. Commun. Networks, 9 (6): 528-534 (2016)Delilah: eBPF-offload on Computational Storage., , , , и . DaMoN, стр. 70-76. ACM, (2023)