From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Characterizing client-side caches of audiovisual content sharing services: Findings and suggestions for forensics., , , , , и . J. Inf. Secur. Appl., (2022)Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers., , , , , , и . J. Cryptol., 19 (4): 441-462 (2006)DES with any reduced masked rounds is not secure against side-channel attacks., , и . Comput. Math. Appl., 60 (2): 347-354 (2010)One-Shot Video Inpainting., , и . CoRR, (2023)Semi-bent Functions., , и . ASIACRYPT, том 917 из Lecture Notes in Computer Science, стр. 107-118. Springer, (1994)On the Correlation Immune Functions and Their Nonlinearity., , , и . ASIACRYPT, том 1163 из Lecture Notes in Computer Science, стр. 232-243. Springer, (1996)New Public-Key Cryptosystem Using Braid Groups., , , , , и . CRYPTO, том 1880 из Lecture Notes in Computer Science, стр. 166-183. Springer, (2000)X-SSD: A Storage System with Native Support for Database Logging and Replication., , , , , , , и . SIGMOD Conference, стр. 988-1002. ACM, (2022)Amplified Boomerang Attack against Reduced-Round SHACAL., , , , , и . ASIACRYPT, том 2501 из Lecture Notes in Computer Science, стр. 243-253. Springer, (2002)It Takes Two: Instrumenting the Interaction between In-Memory Databases and Solid-State Drives., , , , , и . CIDR, www.cidrdb.org, (2020)