From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A differential approach to a polynomial equivalence problem., и . ISIT, стр. 142. IEEE, (2004)PKP-Based Signature Scheme., , , , и . IACR Cryptology ePrint Archive, (2018)A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words.. IACR Cryptology ePrint Archive, (2005)Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form., , и . ASIACRYPT (1), том 8873 из Lecture Notes in Computer Science, стр. 21-41. Springer, (2014)Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem., , , и . Public Key Cryptography, том 6571 из Lecture Notes in Computer Science, стр. 473-493. Springer, (2011)A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems., , , , и . Public Key Cryptography, том 9020 из Lecture Notes in Computer Science, стр. 150-174. Springer, (2015)Non-quantum cryptanalysis of the noisy version of Aaronson-Christiano's quantum money scheme., , , , и . IET Inf. Secur., 13 (4): 362-366 (2019)Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems., и . INDOCRYPT, том 2904 из Lecture Notes in Computer Science, стр. 235-251. Springer, (2003)Security Analysis of Multivariate Polynomials for Hashing., , и . Inscrypt, том 5487 из Lecture Notes in Computer Science, стр. 115-124. Springer, (2008)MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme., , , , , , и . INTRUST, том 7222 из Lecture Notes in Computer Science, стр. 184-203. Springer, (2011)