From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes., , , и . Des. Codes Cryptogr., 7 (1-2): 101-110 (1996)Scalable RFID security protocols supporting tag ownership transfer., и . Comput. Commun., 34 (4): 556-566 (2011)On Integer-Valued Rational Polynomials and Depth Distributions of Binary Codes.. IEEE Trans. Inf. Theory, 44 (7): 3146-3150 (1998)On the Security of 2-Key Triple DES.. IEEE Trans. Inf. Theory, 62 (11): 6260-6267 (2016)Aperiodic and semi-periodic perfect maps.. IEEE Trans. Inf. Theory, 41 (1): 88-95 (1995)Minimal Weight k-SR Representations., , и . IMACC, том 1025 из Lecture Notes in Computer Science, стр. 34-43. Springer, (1995)Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs., и . IMACC, том 2260 из Lecture Notes in Computer Science, стр. 63-72. Springer, (2001)Cryptanalysis of the EPBC Authenticated Encryption Mode.. IMACC, том 4887 из Lecture Notes in Computer Science, стр. 118-128. Springer, (2007)The Hsu-Harn-Mu-Zhang-Zhu group key establishment protocol is insecure.. CoRR, (2018)Key control in key agreement protocols, , и . IEE Electronics Letters, 34 (10): 980--981 (1998)