From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimal Merging in Quantum k-xor and k-xor-sum Algorithms., и . EUROCRYPT (2), том 12106 из Lecture Notes in Computer Science, стр. 311-340. Springer, (2020)Universal Horn Sentences and the Joint Embedding Property., , и . Discret. Math. Theor. Comput. Sci., (2021)On Quantum Slide Attacks., , и . SAC, том 11959 из Lecture Notes in Computer Science, стр. 492-519. Springer, (2019)Quantum Procedures for Nested Search Problems: with Applications in Cryptanalysis., и . IACR Commun. Cryptol., 1 (3): 9 (2024)Quantum Security Analysis of CSIDH., и . EUROCRYPT (2), том 12106 из Lecture Notes in Computer Science, стр. 493-522. Springer, (2020)Simplified MITM Modeling for Permutations: New (Quantum) Attacks., и . CRYPTO (3), том 13509 из Lecture Notes in Computer Science, стр. 717-747. Springer, (2022)Quantum Boomerang Attacks and Some Applications., , и . SAC, том 13203 из Lecture Notes in Computer Science, стр. 332-352. Springer, (2021)Quantum Algorithms for the k -xor Problem., , и . ASIACRYPT (1), том 11272 из Lecture Notes in Computer Science, стр. 527-559. Springer, (2018)Improving Generic Attacks Using Exceptional Functions., , , и . CRYPTO (4), том 14923 из Lecture Notes in Computer Science, стр. 105-138. Springer, (2024)Key Committing Attacks against AES-based AEAD Schemes., , , , и . IACR Trans. Symmetric Cryptol., 2024 (1): 135-157 (2024)