From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA., , и . ICICS, том 1334 из Lecture Notes in Computer Science, стр. 233-246. Springer, (1997)Advanced Slide Attacks., и . EUROCRYPT, том 1807 из Lecture Notes in Computer Science, стр. 589-606. Springer, (2000)Cryptanalysis of the Cellular Encryption Algorithm., , и . CRYPTO, том 1294 из Lecture Notes in Computer Science, стр. 526-537. Springer, (1997)Cryptanalysis of SPEED., , , , и . Selected Areas in Cryptography, том 1556 из Lecture Notes in Computer Science, стр. 319-338. Springer, (1998)Differential Cryptanalysis of KHF.. FSE, том 1372 из Lecture Notes in Computer Science, стр. 293-296. Springer, (1998)Towards Efficient Second-Order Power Analysis., и . CHES, том 3156 из Lecture Notes in Computer Science, стр. 1-15. Springer, (2004)Intercepting mobile communications: the insecurity of 802.11., , и . MobiCom, стр. 180-189. ACM, (2001)Do Android users write about electric sheep? Examining consumer reviews in Google Play., и . CCNC, стр. 149-157. IEEE, (2013)Hidden Markov Model Cryptanalysis., и . CHES, том 2779 из Lecture Notes in Computer Science, стр. 17-34. Springer, (2003)An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography., , , , , , и . Information Hiding, том 3727 из Lecture Notes in Computer Science, стр. 327-341. Springer, (2005)