Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Experiment on DES Statistical Cryptanalysis.. ACM Conference on Computer and Communications Security, page 139-147. ACM, (1996)Private Message Franking with After Opening Privacy., and . IACR Cryptology ePrint Archive, (2018)Optimization of the MOVA Undeniable Signature Scheme., , and . Mycrypt, volume 3715 of Lecture Notes in Computer Science, page 196-209. Springer, (2005)The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption., , and . CRYPTO, volume 3621 of Lecture Notes in Computer Science, page 97-117. Springer, (2005)Distance Bounding Based on PUF., and . CANS, volume 10052 of Lecture Notes in Computer Science, page 701-710. (2016)Mafia fraud attack against the RČ Distance-Bounding Protocol., , and . RFID-TA, page 74-79. IEEE, (2012)ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware., , , , , , , and . CHES, volume 6225 of Lecture Notes in Computer Science, page 398-412. Springer, (2010)The Newton Channel., , , and . Information Hiding, volume 1174 of Lecture Notes in Computer Science, page 151-156. Springer, (1996)On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography.. CISC, volume 3822 of Lecture Notes in Computer Science, page 1-9. Springer, (2005)CS-Cipher., and . FSE, volume 1372 of Lecture Notes in Computer Science, page 189-205. Springer, (1998)