Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Updatable Linear Map Commitments and Their Applications in Elementary Databases., , and . PST, page 1-6. IEEE, (2021)MILP-Based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher., , and . IMACC, volume 10655 of Lecture Notes in Computer Science, page 333-351. Springer, (2017)High-speed OFDM Physical-Layer Key Exchange., and . CNS, page 1-9. IEEE, (2023)Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case., and . Selected Areas in Cryptography, volume 2259 of Lecture Notes in Computer Science, page 49-59. Springer, (2001)Sequences, DFT and Resistance against Fast Algebraic Attacks.. SETA, volume 5203 of Lecture Notes in Computer Science, page 197-218. Springer, (2008)A Study on the Pseudorandom Properties of Sequences Generated Via the Additive Order., and . SETA, volume 5203 of Lecture Notes in Computer Science, page 51-59. Springer, (2008)Pisces: A New Zero-Knowledge Protocol for Blockchain Privacy., and . FPS, volume 12637 of Lecture Notes in Computer Science, page 180-204. Springer, (2020)Digital signature with a subliminal channel, and . IEE Proceedings Computers and Digital Techniques, 144 (6): 387--389 (1997)Generating Large Instances of the Gong-Harn Cryptosystem., and . IMACC, volume 2260 of Lecture Notes in Computer Science, page 317-328. Springer, (2001)New designs for signal sets with low cross correlation, balance property, and largelinear span: GF(p) case.. IEEE Trans. Inf. Theory, 48 (11): 2847-2867 (2002)