From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions., , и . IACR Cryptology ePrint Archive, (2010)Analysis of SHA-1 in Encryption Mode., , и . CT-RSA, том 2020 из Lecture Notes in Computer Science, стр. 70-83. Springer, (2001)On the Security of Double and 2-Key Triple Modes of Operation., и . FSE, том 1636 из Lecture Notes in Computer Science, стр. 215-230. Springer, (1999)Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders., , , и . CARDIS, USENIX, (2002)Blinded Fault Resistant Exponentiation Revisited., , и . FDTC, стр. 3-9. IEEE Computer Society, (2009)Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages., , , , , и . Public Key Cryptography, том 2274 из Lecture Notes in Computer Science, стр. 17-33. Springer, (2002)Security Analysis of SHA-256 and Sisters., и . Selected Areas in Cryptography, том 3006 из Lecture Notes in Computer Science, стр. 175-193. Springer, (2003)Smart Card Crypto-Coprocessors for Public-Key Cryptography., и . CARDIS, том 1820 из Lecture Notes in Computer Science, стр. 372-379. Springer, (1998)Reducing the Collision Probability of Alleged Comp128., и . CARDIS, том 1820 из Lecture Notes in Computer Science, стр. 366-371. Springer, (1998)From Secure Memories to Smart Card Security., и . Secure Integrated Circuits and Systems, Springer, (2010)