From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Small MACs from Small Permutations., , , и . IACR Cryptol. ePrint Arch., (2022)Haraka - Efficient Short-Input Hashing for Post-Quantum Applications., , , и . IACR Cryptology ePrint Archive, (2016)The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE., и . Selected Areas in Cryptography, том 8282 из Lecture Notes in Computer Science, стр. 174-184. Springer, (2013)Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family., , и . FSE, том 7549 из Lecture Notes in Computer Science, стр. 244-263. Springer, (2012)The Grindahl Hash Functions., , и . FSE, том 4593 из Lecture Notes in Computer Science, стр. 39-57. Springer, (2007)MPC-Friendly Symmetric Key Primitives., , , , и . CCS, стр. 430-443. ACM, (2016)Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications., , , , , и . CRYPTO (3), том 14083 из Lecture Notes in Computer Science, стр. 573-606. Springer, (2023)Cryptanalysis of the GOST Hash Function., , , , и . CRYPTO, том 5157 из Lecture Notes in Computer Science, стр. 162-178. Springer, (2008)The Impact of Carries on the Complexity of Collision Attacks on SHA-1., , , и . FSE, том 4047 из Lecture Notes in Computer Science, стр. 278-292. Springer, (2006)A (Second) Preimage Attack on the GOST Hash Function., , и . FSE, том 5086 из Lecture Notes in Computer Science, стр. 224-234. Springer, (2008)