From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Another look at non-uniformity., и . Groups Complexity Cryptology, 5 (2): 117-139 (2013)Time for a Paradigm Shift in Our Disciplinary Culture?. Mycrypt, том 10311 из Lecture Notes in Computer Science, стр. 11-18. Springer, (2016)Constructing Elliptic Curve Cryptosystems in Characteristic 2.. CRYPTO, том 537 из Lecture Notes in Computer Science, стр. 156-167. Springer, (1990)Another Look at Security Theorems for 1-Key Nested MACs., и . Open Problems in Mathematics and Computational Science, Springer, (2014)A Security Weakness in Composite-Order Pairing-Based Protocols with Imbedding Degree k>2.. IACR Cryptology ePrint Archive, (2010)Discrete Logarithms, Diffie-Hellman, and Reductions., , и . IACR Cryptology ePrint Archive, (2010)Cryptocash, cryptocurrencies, and cryptocontracts., и . Des. Codes Cryptogr., 78 (1): 87-102 (2016)The State of Elliptic Curve Cryptography., , и . Des. Codes Cryptogr., 19 (2/3): 173-193 (2000)Discrete Logarithms and discreet Curves.. A Perspective in Theoretical Computer Science, том 16 из World Scientific Series in Computer Science, World Scientific, (1989)Cryptography as a Teaching Tool.. Cryptologia, 21 (4): 317-326 (1997)