From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward., , , и . WISA, том 7115 из Lecture Notes in Computer Science, стр. 40-54. Springer, (2011)Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications.. ACNS, том 8479 из Lecture Notes in Computer Science, стр. 253-270. Springer, (2014)Extended meet-in-the-middle attacks on some Feistel constructions., , , и . Des. Codes Cryptogr., 80 (3): 587-618 (2016)Preface to Volume 2019, Issue 1., и . IACR Trans. Symmetric Cryptol., 2019 (1): 1-4 (2019)Tight Bounds of Differentially and Linearly Active S-Boxes and Division Property of Lilliput., и . IEEE Trans. Computers, 67 (5): 717-732 (2018)2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160., и . IACR Cryptology ePrint Archive, (2012)Improved Collision Attack on MD4., , , и . IACR Cryptology ePrint Archive, (2005)Refinements of the k-tree Algorithm for the Generalized Birthday Problem., и . IACR Cryptology ePrint Archive, (2016)New Impossible Differential Search Tool from Design and Cryptanalysis Aspects., и . IACR Cryptology ePrint Archive, (2016)SoK: Peigen - a Platform for Evaluation, Implementation, and Generation of S-boxes., , , и . IACR Cryptology ePrint Archive, (2019)