From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Security of Today's Online Electronic Banking Systems., , , , и . Comput. Secur., 21 (3): 253-265 (2002)Probabilistic Algebraic Attacks., и . IMACC, том 3796 из Lecture Notes in Computer Science, стр. 290-303. Springer, (2005)On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions., , , и . IMACC, том 2898 из Lecture Notes in Computer Science, стр. 82-92. Springer, (2003)Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems., и . Public Key Cryptography, том 3386 из Lecture Notes in Computer Science, стр. 275-287. Springer, (2005)On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem., , и . Public Key Cryptography, том 2274 из Lecture Notes in Computer Science, стр. 199-210. Springer, (2002)Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051µP., , , , и . CHES, том 3659 из Lecture Notes in Computer Science, стр. 106-118. Springer, (2005)Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment., , и . CHES, том 7428 из Lecture Notes in Computer Science, стр. 268-282. Springer, (2012)Technologies for controlled anonymity, , , , , , , , , и 1 other автор(ы). Deliverable 10. Anonymity and Privacy in Electronic Services, (2003)Location privacy in wireless personal area networks., и . Workshop on Wireless Security, стр. 11-18. ACM, (2006)A fast dual-field modular arithmetic logic unit and its hardware implementation., , и . ISCAS, IEEE, (2006)