From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Polynomial Time Algorithms for Multicast Network Code Construction, , , , , , и . #IEEE_J_IT#, 51 (6): 1973 - 1982 (июня 2005)DTLS-HIMMO: Achieving DTLS Certificate Security with Symmetric Key Overhead., , , , и . ESORICS (1), том 9326 из Lecture Notes in Computer Science, стр. 224-242. Springer, (2015)A generalisation of the Gilbert-Varshamov bound and its asymptotic evaluation. CoRR, (2011)On the entropy rate of a hidden Markov model., , , , и . ISIT, стр. 12. IEEE, (2004)Round5: Compact and Fast Post-quantum Public-Key Encryption., , , , , , , , и . PQCrypto, том 11505 из Lecture Notes in Computer Science, стр. 83-102. Springer, (2019)HIMMO: a collusion-resistant identity-based scheme for symmetric key generation., , , , и . ACM Commun. Comput. Algebra, 49 (1): 19 (2015)Lighting systems control for demand response., , , , и . ISGT, стр. 1-6. IEEE, (2012)Round5: Compact and Fast Post-Quantum Public-Key Encryption., , , , , , и . IACR Cryptology ePrint Archive, (2018)spKEX: An optimized lattice-based key exchange., , , и . IACR Cryptology ePrint Archive, (2017)An Algorithm to Analyze Non-injective S-Boxes., и . ICT-EurAsia, том 8407 из Lecture Notes in Computer Science, стр. 576-585. Springer, (2014)