Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New concepts in evolutionary search for Boolean functions in cryptology., , and . IEEE Congress on Evolutionary Computation, page 2157-2164. IEEE, (2003)Indirect message injection for MAC generation., , , , and . J. Math. Cryptol., 7 (3): 253-277 (2013)Speech encryption using discrete orthogonal transforms., , and . ICASSP, page 1647-1650. IEEE, (1990)Five Sealed-bid Auction Models., , , and . ACSW, volume 21 of CRPIT, page 77-86. Australian Computer Society, (2003)Tweaking Generic OTR to Avoid Forgery Attacks., , , , and . IACR Cryptology ePrint Archive, (2018)Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN., , , , , and . IACR Cryptology ePrint Archive, (2015)Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction., and . ISPEC, volume 4464 of Lecture Notes in Computer Science, page 209-224. Springer, (2007)Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions., , , , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 494-508. Springer, (2004)Strengthening the Key Schedule of the AES., , , , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 226-240. Springer, (2002)An Efficient and Verifiable Solution to the Millionaire Problem., , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 51-66. Springer, (2004)