From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes., , , , , , , и . IWSEC, том 9836 из Lecture Notes in Computer Science, стр. 91-110. Springer, (2016)A new model of Client-Server Communications under information theoretic security., , , и . ITW, стр. 511-515. IEEE, (2014)A coding theorem for cheating-detectable (2, 2)-threshold blockwise secret sharing schemes., , и . ISIT, стр. 1308-1312. IEEE, (2009)Security notions for information theoretically secure encryptions., и . ISIT, стр. 1777-1781. IEEE, (2011)The Optimal n-out-of-n Visual Secret Sharing Scheme for Gray-Scale Images., и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 85-A (10): 2238-2247 (2002)An Abstraction Model for 1-bit Probing Attack on Block Ciphers., , , и . ICCCS, стр. 502-506. IEEE, (2019)Strongly secure ramp secret sharing schemes for general access structures., и . Inf. Process. Lett., 97 (2): 52-57 (2006)Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher., , , , , и . ICISC, том 7839 из Lecture Notes in Computer Science, стр. 395-409. Springer, (2012)Single-Round Pattern Matching Key Generation Using Physically Unclonable Function., , , , и . Secur. Commun. Networks, (2019)An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl., , , , и . CT-RSA, том 8366 из Lecture Notes in Computer Science, стр. 424-443. Springer, (2014)