From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend., , и . J. Inf. Process., (2023)Exploring the optimality of byte-wise permutations of a piccolo-type block cipher., , , и . Inf. Process. Lett., (февраля 2024)Cryptanalysis of Reduced Kreyvium., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (9): 1548-1556 (2018)Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods., и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (11): 1260-1273 (2020)Design Strategy of Z-source Inverter for Utilization of Power Semiconductors with Extremely Low Short-circuit Capability., , , , , и . IECON, стр. 4997-5002. IEEE, (2019)Novel dead time controlled gate driver using the current sensor of SiC-MOSFET., , , , , и . IECON, стр. 1651-1656. IEEE, (2015)Generic Key Recovery Attack on Feistel Scheme., и . IACR Cryptology ePrint Archive, (2015)Generic Key Recovery Attack on Feistel Scheme., и . ASIACRYPT (1), том 8269 из Lecture Notes in Computer Science, стр. 464-485. Springer, (2013)Yoroi: Updatable Whitebox Cryptography., и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (4): 587-617 (2021)Coefficient Grouping: Breaking Chaghri and More., , , , и . IACR Cryptol. ePrint Arch., (2022)