From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tight Security Analysis of the Public Permutation-Based PMAC_Plus., , и . IACR Cryptol. ePrint Arch., (2022)Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE., , , , , , и . IACR Trans. Symmetric Cryptol., 2019 (4): 119-146 (2019)On the security of joint signature and encryption revisited., и . J. Math. Cryptol., 10 (3-4): 181-221 (2016)Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher., , и . C2SI, том 13874 из Lecture Notes in Computer Science, стр. 178-195. Springer, (2023)An Inverse-Free Single-Keyed Tweakable Enciphering Scheme., и . ASIACRYPT (2), том 9453 из Lecture Notes in Computer Science, стр. 159-180. Springer, (2015)Generic Attacks Against Beyond-Birthday-Bound MACs., , и . CRYPTO (1), том 10991 из Lecture Notes in Computer Science, стр. 306-336. Springer, (2018)Single Key Variant of PMAC_Plus., , , , и . IACR Trans. Symmetric Cryptol., 2017 (4): 268-305 (2017)Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model., , , и . FSE, том 3557 из Lecture Notes in Computer Science, стр. 243-254. Springer, (2005)Pseudorandomness of SPN-Type Transformations., , , , , и . ACISP, том 3108 из Lecture Notes in Computer Science, стр. 212-223. Springer, (2004)Proof of Mirror Theory for a Wide Range of $_$., , , , и . EUROCRYPT (4), том 14007 из Lecture Notes in Computer Science, стр. 470-501. Springer, (2023)