From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401)., , , и . Dagstuhl Manifestos, 5 (1): 25-37 (2015)Problems, solutions and experience of the first international student's Olympiad in cryptography., , , , , , , , и . IACR Cryptology ePrint Archive, (2015)Coding Theory and Hash Function Design - A Case Study: The Lane Hash Function., и . Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, том 23 из NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2009)Equivalent Keys in Multivariate Quadratic Public Key Systems., и . IACR Cryptology ePrint Archive, (2005)On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version)., и . IACR Cryptology ePrint Archive, (2005)Location privacy in wireless personal area networks., и . Workshop on Wireless Security, стр. 11-18. ACM, (2006)Identification via location-profiling in GSM networks., , , и . WPES, стр. 23-32. ACM, (2008)A fast dual-field modular arithmetic logic unit and its hardware implementation., , и . ISCAS, IEEE, (2006)Cryptanalysis of the Xiao - Lai White-Box AES Implementation., , и . Selected Areas in Cryptography, том 7707 из Lecture Notes in Computer Science, стр. 34-49. Springer, (2012)Optimistic Fair Priced Oblivious Transfer., и . AFRICACRYPT, том 6055 из Lecture Notes in Computer Science, стр. 131-147. Springer, (2010)