From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities., , и . IACR Cryptol. ePrint Arch., (2006)Fast Collision Attack on MD5.. IACR Cryptol. ePrint Arch., (2006)Chosen-prefix collisions for MD5 and applications., , и . Int. J. Appl. Cryptogr., 2 (4): 322-359 (2012)Advances in Hash Function Cryptanalysis.. ERCIM News, (2012)Advanced Lattice Sieving on GPUs, with Tensor Cores., , и . EUROCRYPT (2), том 12697 из Lecture Notes in Computer Science, стр. 249-279. Springer, (2021)Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate., , , , , , и . CRYPTO, том 5677 из Lecture Notes in Computer Science, стр. 55-69. Springer, (2009)New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis.. EUROCRYPT, том 7881 из Lecture Notes in Computer Science, стр. 245-261. Springer, (2013)Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities., , и . EUROCRYPT, том 4515 из Lecture Notes in Computer Science, стр. 1-22. Springer, (2007)Non-interactive Cryptographic Timestamping Based on Verifiable Delay Functions., , и . Financial Cryptography, том 12059 из Lecture Notes in Computer Science, стр. 541-558. Springer, (2020)Efficient Doubling on Genus Two Curves over Binary Fields., и . Selected Areas in Cryptography, том 3357 из Lecture Notes in Computer Science, стр. 170-181. Springer, (2004)