From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Structured Design of Cryptographically Good S-Boxes., и . J. Cryptol., 3 (1): 27-41 (1990)A Design of a Fast Pipelined Modular Multiplier Based on a Diminished-Radix Algorithm., , и . J. Cryptol., 6 (4): 183-208 (1993)The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis., и . ACM Conference on Computer and Communications Security, стр. 148-155. ACM, (1994)New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs., , и . EUROCRYPT, том 2045 из Lecture Notes in Computer Science, стр. 420-436. Springer, (2001)Toward Provable Security of Substitution-Permutation Encryption Networks., и . Selected Areas in Cryptography, том 1556 из Lecture Notes in Computer Science, стр. 43-56. Springer, (1998)Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes., и . CRYPTO, стр. 139-143. Plenum Press, New York, (1982)A Note on the Decomposition of Cyclic Codes into Cyclic Classes, , и . Inf. Control., 22 (1): 100-106 (февраля 1973)Difference Sets of the Hadamard Type and Quasi-Cyclic Codes, , и . Inf. Control., 26 (4): 341-350 (декабря 1974)Avalanche Characteristics of Substitution-Permutation Encryption Networks., и . IEEE Trans. Computers, 44 (9): 1131-1139 (1995)Resistance of Balanced s-Boxes to Linear and Differential Cryptanalysis., и . Inf. Process. Lett., 56 (5): 249-252 (1995)