From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Hardware Design Model for Cryptographic Algorithms., , и . ESORICS, том 648 из Lecture Notes in Computer Science, стр. 419-434. Springer, (1992)A new inequality in discrete Fourier theory., , и . IEEE Trans. Inf. Theory, 49 (8): 2038-2040 (2003)Information Authentication: Hash Functions and Digital Signatures., , и . Computer Security and Industrial Cryptography, том 741 из Lecture Notes in Computer Science, стр. 87-131. Springer, (1991)Secure Communication for Secure Agent-Based Electronic Commerce Applications., , и . E-Commerce Agents, том 2033 из Lecture Notes in Computer Science, стр. 180-190. Springer, (2001)In-place memory management of algebraic algorithms on application specific ICs., , , и . VLSI Signal Processing, 3 (3): 193-200 (1991)On a Resynchronization Weakness in a Class of Combiners with Memory., , , и . SCN, том 2576 из Lecture Notes in Computer Science, стр. 164-173. Springer, (2002)Kernel Canonical Correlation Analysis and Least Squares Support Vector Machines., , , , и . ICANN, том 2130 из Lecture Notes in Computer Science, стр. 384-389. Springer, (2001)SHA: A Design for Parallel Architectures?, , и . EUROCRYPT, том 1233 из Lecture Notes in Computer Science, стр. 348-362. Springer, (1997)New Weak-Key Classes of IDEA., , , и . ICICS, том 2513 из Lecture Notes in Computer Science, стр. 315-326. Springer, (2002)A concepts inventory for an attractive teaching approach of the mathematics of circuits and systems.. ISCAS, стр. 2800-2803. IEEE, (2010)