From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

State Management for Hash-Based Signatures., , , , , и . SSR, том 10074 из Lecture Notes in Computer Science, стр. 244-260. Springer, (2016)High speed architectures for Leviathan: a binary tree based stream cipher., , , и . Microprocess. Microsystems, 28 (10): 573-584 (2004)Assessing and Exploiting Domain Name Misinformation., и . EuroS&P Workshops, стр. 475-486. IEEE, (2023)The Security of the Extended Codebook (XCB) Mode of Operation., и . Selected Areas in Cryptography, том 4876 из Lecture Notes in Computer Science, стр. 311-327. Springer, (2007)The Security and Performance of the Galois/Counter Mode (GCM) of Operation., и . INDOCRYPT, том 3348 из Lecture Notes in Computer Science, стр. 343-355. Springer, (2004)Galois Counter Mode.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security., и . Selected Areas in Cryptography, том 2012 из Lecture Notes in Computer Science, стр. 14-28. Springer, (2000)Multiple forgery attacks against Message Authentication Codes., и . IACR Cryptology ePrint Archive, (2005)The Security and Performance of the Galois/Counter Mode of Operation (Full Version)., и . IACR Cryptology ePrint Archive, (2004)Identifying Encrypted Malware Traffic with Contextual Flow Data., и . AISec@CCS, стр. 35-46. ACM, (2016)