Author of the publication

How to Handle Rainbow Tables with External Memory.

, , , and . ACISP (1), volume 10342 of Lecture Notes in Computer Science, page 306-323. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How secret-sharing can defeat terrorist fraud., , and . WISEC, page 145-156. ACM, (2011)Reducing Time Complexity in RFID Systems., , and . Selected Areas in Cryptography, volume 3897 of Lecture Notes in Computer Science, page 291-306. Springer, (2005)RFID Distance Bounding Multistate Enhancement., , and . INDOCRYPT, volume 5922 of Lecture Notes in Computer Science, page 290-307. Springer, (2009)RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks., and . CANS, volume 5888 of Lecture Notes in Computer Science, page 119-133. Springer, (2009)Unique in the Smart Grid -The Privacy Cost of Fine-Grained Electrical Consumption Data., , , , , and . CoRR, (2022)ICRP: Internet-Friendly Cryptographic Relay-Detection Protocol., , , and . Cryptogr., 6 (4): 52 (2022)The Poulidor Distance-Bounding Protocol., , and . RFIDSec, volume 6370 of Lecture Notes in Computer Science, page 239-257. Springer, (2010)Optimal Security Limits of RFID Distance Bounding Protocols., , , and . RFIDSec, volume 6370 of Lecture Notes in Computer Science, page 220-238. Springer, (2010)An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement., and . ISC, volume 5735 of Lecture Notes in Computer Science, page 250-261. Springer, (2009)How Distance-Bounding Can Detect Internet Traffic Hijacking., , , and . CANS, volume 13099 of Lecture Notes in Computer Science, page 355-371. Springer, (2021)