From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Moral panics revisited. Young, 8 (1): 22-35 (2000)Development of an Autonomous Forest Machine for Path Tracking., , и . FSR, том 25 из Springer Tracts in Advanced Robotics, стр. 603-614. Springer, (2005)Solving LPN Using Covering Codes., , и . J. Cryptol., 33 (1): 1-33 (2020)On the cardinality of systematic authentication codes via error-correcting codes., , и . IEEE Trans. Inf. Theory, 42 (2): 566-578 (1996)Cache-timing attack against HQC., , , , и . IACR Cryptol. ePrint Arch., (2023)New improved attacks on SNOW-V., , и . IACR Cryptol. ePrint Arch., (2021)Ünderground Capacitors" Very Efficient Decoupling for High Performance UHF Signal Processing ICs., , и . EDAC-ETC-EUROASIC, стр. 655. IEEE Computer Society, (1994)Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS., и . ASIACRYPT (4), том 13093 из Lecture Notes in Computer Science, стр. 33-62. Springer, (2021)A Novel CCA Attack Using Decryption Errors Against LAC., , и . ASIACRYPT (1), том 11921 из Lecture Notes in Computer Science, стр. 82-111. Springer, (2019)Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators.. ASIACRYPT, том 1514 из Lecture Notes in Computer Science, стр. 342-356. Springer, (1998)