From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Lossiness of the Rabin Trapdoor Function.. IACR Cryptology ePrint Archive, (2013)HB#: Increasing the Security and Efficiency of HB+., , и . EUROCRYPT, том 4965 из Lecture Notes in Computer Science, стр. 361-378. Springer, (2008)Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes., , , , и . FSE, том 9054 из Lecture Notes in Computer Science, стр. 319-341. Springer, (2015)New Constructions of MACs from (Tweakable) Block Ciphers., , и . IACR Trans. Symmetric Cryptol., 2017 (2): 27-58 (2017)Reconsidering the Security Bound of AES-GCM-SIV., и . IACR Trans. Symmetric Cryptol., 2017 (4): 240-267 (2017)Blind Schnorr Signatures in the Algebraic Group Model., , и . IACR Cryptology ePrint Archive, (2019)The Deoxys AEAD Family., , , и . J. Cryptol., 34 (3): 31 (2021)Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results., , и . Selected Areas in Cryptography, том 8781 из Lecture Notes in Computer Science, стр. 129-146. Springer, (2014)Strengthening the Known-Key Security Notion for Block Ciphers., и . FSE, том 9783 из Lecture Notes in Computer Science, стр. 494-513. Springer, (2016)EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC., и . CRYPTO (1), том 9814 из Lecture Notes in Computer Science, стр. 121-149. Springer, (2016)