From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the cardinality of systematic authentication codes via error-correcting codes., , и . IEEE Trans. Inf. Theory, 42 (2): 566-578 (1996)Cache-timing attack against HQC., , , , и . IACR Cryptol. ePrint Arch., (2023)Ünderground Capacitors" Very Efficient Decoupling for High Performance UHF Signal Processing ICs., , и . EDAC-ETC-EUROASIC, стр. 655. IEEE Computer Society, (1994)A Novel CCA Attack Using Decryption Errors Against LAC., , и . ASIACRYPT (1), том 11921 из Lecture Notes in Computer Science, стр. 82-111. Springer, (2019)Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators.. ASIACRYPT, том 1514 из Lecture Notes in Computer Science, стр. 342-356. Springer, (1998)Snow 2.0 IP Core for Trusted Hardware., , и . FPL, стр. 281-286. IEEE, (2005)Bucket Hashing with a Small Key Size.. EUROCRYPT, том 1233 из Lecture Notes in Computer Science, стр. 149-162. Springer, (1997)Almost k-wise Independent Sample Spaces and Their Cryptologic Applications., , и . EUROCRYPT, том 1233 из Lecture Notes in Computer Science, стр. 409-421. Springer, (1997)Moral panics revisited. Young, 8 (1): 22-35 (2000)Development of an Autonomous Forest Machine for Path Tracking., , и . FSR, том 25 из Springer Tracts in Advanced Robotics, стр. 603-614. Springer, (2005)