Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiparty Routing: Secure Routing for Mixnets., , , and . CoRR, (2017)New Second-Preimage Attacks on Hash Functions., , , , , , , and . J. Cryptol., 29 (4): 657-696 (2016)Comparison of scanned administrative document images., , , and . ICMV, volume 11433 of SPIE Proceedings, page 114333A. SPIE, (2019)Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård., , , and . Selected Areas in Cryptography, volume 5867 of Lecture Notes in Computer Science, page 393-414. Springer, (2009)Second Preimage Attacks on Dithered Hash Functions., , , , , , and . EUROCRYPT, volume 4965 of Lecture Notes in Computer Science, page 270-288. Springer, (2008)SLC: Efficient Authenticated Encryption for Short Packages., , and . Sicherheit, volume P-77 of LNI, page 270-278. GI, (2006)The Symbiosis between Collision and Preimage Resistance., and . IMACC, volume 7089 of Lecture Notes in Computer Science, page 152-171. Springer, (2011)Comparison of the scanned pages of the contractual documents., , , and . ICMV, volume 10696 of SPIE Proceedings, page 1069605. SPIE, (2017)Comparison of scanned administrative document images., , , and . CoRR, (2020)Informatics in an advanced mathematical high school., and . ITiCSE, page 231. ACM, (1996)