From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptographic properties and application of a Generalized Unbalanced Feistel Network structure., , , и . Cryptogr. Commun., 3 (3): 141-164 (2011)Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure., , , и . ACISP, том 5594 из Lecture Notes in Computer Science, стр. 73-89. Springer, (2009)Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack., , и . ICICS, том 5308 из Lecture Notes in Computer Science, стр. 157-173. Springer, (2008)Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure (Revised Version)., , , и . IACR Cryptology ePrint Archive, (2009)AES Variants Secure against Related-Key Differential and Boomerang Attacks., , , , и . WISTP, том 6633 из Lecture Notes in Computer Science, стр. 191-207. Springer, (2011)An Analysis of the Compact XSL Attack on BES and Embedded SMS4., , и . CANS, том 5888 из Lecture Notes in Computer Science, стр. 103-118. Springer, (2009)Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack., , и . IACR Cryptology ePrint Archive, (2009)Impossible Boomerang Attack for Block Cipher Structures., и . IWSEC, том 5824 из Lecture Notes in Computer Science, стр. 22-37. Springer, (2009)SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks., , , , , , и . AFRICACRYPT, том 7374 из Lecture Notes in Computer Science, стр. 270-286. Springer, (2012)New Applications of Differential Bounds of the SDS Structure., и . ISC, том 5222 из Lecture Notes in Computer Science, стр. 367-384. Springer, (2008)