From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA., , и . ICICS, том 1334 из Lecture Notes in Computer Science, стр. 233-246. Springer, (1997)Advanced Slide Attacks., и . EUROCRYPT, том 1807 из Lecture Notes in Computer Science, стр. 589-606. Springer, (2000)Cryptanalysis of the Cellular Encryption Algorithm., , и . CRYPTO, том 1294 из Lecture Notes in Computer Science, стр. 526-537. Springer, (1997)A Security Evaluation of Whitenoise.. IACR Cryptology ePrint Archive, (2003)Cryptanalysis of a Cognitive Authentication Scheme., и . IACR Cryptology ePrint Archive, (2006)Comments on Twofish as an AES Candidate., , , , и . AES Candidate Conference, стр. 355-356. (2000)Towards Efficient Second-Order Power Analysis., и . CHES, том 3156 из Lecture Notes in Computer Science, стр. 1-15. Springer, (2004)Intercepting mobile communications: the insecurity of 802.11., , и . MobiCom, стр. 180-189. ACM, (2001)Do Android users write about electric sheep? Examining consumer reviews in Google Play., и . CCNC, стр. 149-157. IEEE, (2013)Hidden Markov Model Cryptanalysis., и . CHES, том 2779 из Lecture Notes in Computer Science, стр. 17-34. Springer, (2003)