From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Funkspiel schemes: an alternative to conventional tamper resistance., , , и . ACM Conference on Computer and Communications Security, стр. 125-133. ACM, (2000)Hom Complexes of Set Systems.. Electron. J. Comb., 20 (1): 4 (2013)Exact sequences for the homology of the matching complex.. J. Comb. Theory, Ser. A, 115 (8): 1504-1526 (2008)Generalized triangulations and diagonal-free subsets of stack polyominoes.. J. Comb. Theory, Ser. A, 112 (1): 117-142 (2005)Securing RSA-KEM via the AES., и . Public Key Cryptography, том 3386 из Lecture Notes in Computer Science, стр. 29-46. Springer, (2005)Security Proofs for the RSA-PSS Signature Scheme and Its Variants.. IACR Cryptology ePrint Archive, (2001)Oddly Triangulated Polygons: 11298 2007, 547., , и . The American Mathematical Monthly, 116 (4): 371-372 (2009)An OAEP Variant With a Tight Security Proof.. IACR Cryptology ePrint Archive, (2002)Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1., и . RFC, (февраля 2003)PKCS #1: RSA Cryptography Specifications Version 2.2., , , и . RFC, (ноября 2016)