From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Extending Wiener's Attack in the Presence of Many Decrypting Exponents., и . CQRE, том 1740 из Lecture Notes in Computer Science, стр. 153-166. Springer, (1999)A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU.. CRYPTO, том 4622 из Lecture Notes in Computer Science, стр. 150-169. Springer, (2007)Testing set proportionality and the Ádám isomorphism of circulant graphs., , , и . J. Discrete Algorithms, 4 (2): 324-335 (2006)Approximate Integer Common Divisors.. CaLC, том 2146 из Lecture Notes in Computer Science, стр. 51-66. Springer, (2001)Effective LLL Reduction for Lattice Decoding., и . ISIT, стр. 196-200. IEEE, (2007)Symplectic Lattice Reduction and NTRU., , и . EUROCRYPT, том 4004 из Lecture Notes in Computer Science, стр. 233-253. Springer, (2006)Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures., , , и . IACR Cryptology ePrint Archive, (2004)Factoring N = prq for Large r., , и . CRYPTO, том 1666 из Lecture Notes in Computer Science, стр. 326-337. Springer, (1999)Rankin's Constant and Blockwise Lattice Reduction., , , и . CRYPTO, том 4117 из Lecture Notes in Computer Science, стр. 112-130. Springer, (2006)NTRUSIGN: Digital Signatures Using the NTRU Lattice., , , , и . CT-RSA, том 2612 из Lecture Notes in Computer Science, стр. 122-140. Springer, (2003)