From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

New Instances of Quadratic APN Functions., и . IEEE Trans. Inf. Theory, 68 (1): 670-678 (2022)Linearly Self-Equivalent APN Permutations in Small Dimension., , и . IEEE Trans. Inf. Theory, 67 (7): 4863-4875 (2021)Weak-Key Subspace Trails and Applications to AES., , , , и . IACR Cryptol. ePrint Arch., (2019)Secure Computation of the Mean and Related Statistics., , и . TCC, том 3378 из Lecture Notes in Computer Science, стр. 283-302. Springer, (2005)On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes., , , , , , и . CRYPTO, том 3621 из Lecture Notes in Computer Science, стр. 327-343. Springer, (2005)An infinite class of quadratic APN functions which are not equivalent to power mappings., , , и . ISIT, стр. 2637-2641. IEEE, (2006)A new construction of highly nonlinear S-boxes., и . Cryptogr. Commun., 4 (1): 65-77 (2012)ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions., , , , , , , и . USENIX Security Symposium, стр. 1991-2008. USENIX Association, (2023)Pitfalls and Shortcomings for Decompositions and Alignment., , и . EUROCRYPT (4), том 14007 из Lecture Notes in Computer Science, стр. 318-347. Springer, (2023)Observations on the SIMON Block Cipher Family., , и . CRYPTO (1), том 9215 из Lecture Notes in Computer Science, стр. 161-185. Springer, (2015)