Author of the publication

Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers

, and (Eds.) volume 3897 of Lecture Notes in Computer Science, Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Structured Design of Cryptographically Good S-Boxes., and . J. Cryptol., 3 (1): 27-41 (1990)A Design of a Fast Pipelined Modular Multiplier Based on a Diminished-Radix Algorithm., , and . J. Cryptol., 6 (4): 183-208 (1993)The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis., and . ACM Conference on Computer and Communications Security, page 148-155. ACM, (1994)Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes., and . CRYPTO, page 139-143. Plenum Press, New York, (1982)Toward Provable Security of Substitution-Permutation Encryption Networks., and . Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 43-56. Springer, (1998)New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs., , and . EUROCRYPT, volume 2045 of Lecture Notes in Computer Science, page 420-436. Springer, (2001)A Note on the Decomposition of Cyclic Codes into Cyclic Classes, , and . Inf. Control., 22 (1): 100-106 (February 1973)Difference Sets of the Hadamard Type and Quasi-Cyclic Codes, , and . Inf. Control., 26 (4): 341-350 (December 1974)Resistance of Balanced s-Boxes to Linear and Differential Cryptanalysis., and . Inf. Process. Lett., 56 (5): 249-252 (1995)Comment on "Bounds on the Number of Functions Satisfying the Strict Avalanche Criterion"., and . Inf. Process. Lett., 60 (5): 271-275 (1996)