From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

New algorithms for batch verification of standard ECDSA signatures., , , , , и . J. Cryptographic Engineering, 4 (4): 237-258 (2014)CASTREAM: A High-speed, Secure Stream Cipher Suitable for Both Hardware and Software., и . J. Cell. Autom., 9 (2-3): 153-166 (2014)An Analytical Framework for Characterizing Restricted Two Dimensional Cellular Automata Evolution., , , , и . J. Cell. Autom., 3 (4): 313-335 (2008)Theory of a Class of Complemented Group Cellular Automata and Its Application to Cryptography., и . J. Cell. Autom., 2 (3): 243-271 (2007)New Architectural Design of CA-Based Codec., и . IEEE Trans. Very Large Scale Integr. Syst., 18 (7): 1139-1144 (2010)Study of Five-Neighborhood Linear Hybrid Cellular Automata and Their Synthesis., и . ICMC, том 655 из Communications in Computer and Information Science, стр. 68-83. (2017)On the Security of Designing a Cellular Automata Based Stream Cipher., , и . ACISP (2), том 10343 из Lecture Notes in Computer Science, стр. 406-413. Springer, (2017)EscApe: Diagonal Fault Analysis of APE., , и . INDOCRYPT, том 8885 из Lecture Notes in Computer Science, стр. 197-216. Springer, (2014)An Efficient Hardware Design for Combined AES and AEGIS., , и . EST, стр. 1-6. IEEE, (2019)Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry., , , и . AFRICACRYPT, том 8469 из Lecture Notes in Computer Science, стр. 88-108. Springer, (2014)