From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields., , , , , , и . IACR Cryptology ePrint Archive, (2016)Polynomial Time Cryptanalytic Extraction of Neural Network Models., , , , , и . IACR Cryptol. ePrint Arch., (2023)Smoothness Test for Polynomials Defined Over Small Characteristic Finite Fields., , , и . Math. Comput. Sci., 12 (3): 319-337 (2018)Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields., , , , , , и . Adv. in Math. of Comm., 12 (4): 741-759 (2018)PQC-AMX: Accelerating Saber and FrodoKEM on the Apple M1 and M3 SoCs., , , , , , и . IACR Cryptol. ePrint Arch., (2024)SoK: Methods for Sampling Random Permutations in Post-Quantum Cryptography., , и . IACR Cryptol. ePrint Arch., (2024)Walsh Spectrum Analysis on Sampling Distributions., , , , , , , , , и 5 other автор(ы). (июня 2018)Multivariate Correlation Attacks and the Cryptanalysis of LFSR-based Stream Ciphers., и . IACR Cryptol. ePrint Arch., (2023)