From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimization of the MOVA Undeniable Signature Scheme., , и . Mycrypt, том 3715 из Lecture Notes in Computer Science, стр. 196-209. Springer, (2005)RFID Privacy Based on Public-Key Cryptography.. ICISC, том 4296 из Lecture Notes in Computer Science, стр. 1-6. Springer, (2006)Resistance Against General Iterated Attacks.. EUROCRYPT, том 1592 из Lecture Notes in Computer Science, стр. 255-271. Springer, (1999)Can D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard., , , и . EUROCRYPT, том 950 из Lecture Notes in Computer Science, стр. 77-85. Springer, (1994)ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware., , , , , , , и . CHES, том 6225 из Lecture Notes in Computer Science, стр. 398-412. Springer, (2010)Practical and Provably Secure Distance-Bounding., , и . ISC, том 7807 из Lecture Notes in Computer Science, стр. 248-258. Springer, (2013)CS-Cipher., и . FSE, том 1372 из Lecture Notes in Computer Science, стр. 189-205. Springer, (1998)Feistel Ciphers with L2-Decorrelation.. Selected Areas in Cryptography, том 1556 из Lecture Notes in Computer Science, стр. 1-14. Springer, (1998)On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography.. CISC, том 3822 из Lecture Notes in Computer Science, стр. 1-9. Springer, (2005)The Newton Channel., , , и . Information Hiding, том 1174 из Lecture Notes in Computer Science, стр. 151-156. Springer, (1996)