From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptanalysis of a homomorphic encryption scheme., , и . Cryptogr. Commun., 10 (1): 27-39 (2018)Privacy failure in the public-key distance-bounding protocols.. IET Inf. Secur., 10 (4): 188-193 (2016)Cryptanalysis of an E0-like Combiner with Memory., и . J. Cryptol., 21 (3): 430-457 (2008)Feistel Ciphers with L2-Decorrelation.. Selected Areas in Cryptography, том 1556 из Lecture Notes in Computer Science, стр. 1-14. Springer, (1998)ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware., , , , , , , и . CHES, том 6225 из Lecture Notes in Computer Science, стр. 398-412. Springer, (2010)The Newton Channel., , , и . Information Hiding, том 1174 из Lecture Notes in Computer Science, стр. 151-156. Springer, (1996)On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography.. CISC, том 3822 из Lecture Notes in Computer Science, стр. 1-9. Springer, (2005)Optimization of the MOVA Undeniable Signature Scheme., , и . Mycrypt, том 3715 из Lecture Notes in Computer Science, стр. 196-209. Springer, (2005)Practical and Provably Secure Distance-Bounding., , и . ISC, том 7807 из Lecture Notes in Computer Science, стр. 248-258. Springer, (2013)Authenticated Encryption with Variable Stretch., , и . ASIACRYPT (1), том 10031 из Lecture Notes in Computer Science, стр. 396-425. (2016)