From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Lightweight Cryptography for RFID Tags., и . IEEE Secur. Priv., 10 (2): 76-79 (2012)Inferring Bivariate Polynomials for Homomorphic Encryption Application., и . IACR Cryptol. ePrint Arch., (2023)New Configurations of Grain Ciphers: Security Against Slide Attacks., и . IACR Cryptology ePrint Archive, (2018)A Unified Security Perspective on Legally Fair Contract Signing Protocols., и . SecITC, том 11359 из Lecture Notes in Computer Science, стр. 477-491. Springer, (2018)Post-quantum Cryptography and a (Qu)Bit More., и . SecITC, том 11359 из Lecture Notes in Computer Science, стр. 22-28. Springer, (2018)Secretly Embedding Trapdoors into Contract Signing Protocols., и . SECITC, том 10543 из Lecture Notes in Computer Science, стр. 166-186. Springer, (2017)Searching for Gemstones: Flawed Stegosystems May Hide Promissing Ideas., , и . IACR Cryptol. ePrint Arch., (2023)Authenticated Encryption: Toward Next-Generation Algorithms., и . IEEE Secur. Priv., 12 (2): 70-72 (2014)Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas., , и . C2SI, том 13874 из Lecture Notes in Computer Science, стр. 242-260. Springer, (2023)Speeding-Up Elliptic Curve Cryptography Algorithm., и . IACR Cryptol. ePrint Arch., (2022)