From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN., и . EUROCRYPT (2), том 9666 из Lecture Notes in Computer Science, стр. 154-183. Springer, (2016)Indifferentiability of 8-Round Feistel Networks., и . CRYPTO (1), том 9814 из Lecture Notes in Computer Science, стр. 95-120. Springer, (2016)Tight Security Bounds for Key-Alternating Ciphers., и . EUROCRYPT, том 8441 из Lecture Notes in Computer Science, стр. 327-350. Springer, (2014)Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes., , , , и . FSE, том 9054 из Lecture Notes in Computer Science, стр. 319-341. Springer, (2015)Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation., и . IEEE Trans. Inf. Theory, 58 (9): 6165-6182 (2012)Security/Efficiency Tradeoffs for Permutation-Based Hashing., и . EUROCRYPT, том 4965 из Lecture Notes in Computer Science, стр. 220-236. Springer, (2008)The Security of Tandem-DM in the Ideal Cipher Model., , и . J. Cryptol., 30 (2): 495-518 (2017)The Lowest-Degree Polynomial with Nonnegative Coefficients Divisible by the n-th Cyclotomic Polynomial.. Electron. J. Comb., 19 (4): 1 (2012)The Collision Security of Tandem-DM in the Ideal Cipher Model., , и . CRYPTO, том 6841 из Lecture Notes in Computer Science, стр. 561-577. Springer, (2011)Stam's Collision Resistance Conjecture.. EUROCRYPT, том 6110 из Lecture Notes in Computer Science, стр. 597-615. Springer, (2010)