From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An efficient forward private RFID protocol., , , и . ACM Conference on Computer and Communications Security, стр. 43-53. ACM, (2009)Security services for protecting radio mobile systems., , и . Ann. des Télécommunications, 55 (7-8): 352-360 (2000)A Statistical Attack of the FEAL-8 Cryptosystem., и . CRYPTO, том 537 из Lecture Notes in Computer Science, стр. 22-33. Springer, (1990)A Known Plaintext Attack of FEAL-4 and FEAL-6., и . CRYPTO, том 576 из Lecture Notes in Computer Science, стр. 172-181. Springer, (1991)An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol., , и . IACR Cryptology ePrint Archive, (2005)New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography., , и . IACR Cryptology ePrint Archive, (2013)QUAD: Overview and Recent Developments., , , , и . Symmetric Cryptography, том 07021 из Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers., , и . Selected Areas in Cryptography, том 5381 из Lecture Notes in Computer Science, стр. 184-198. Springer, (2008)The Security of Öne-Block-to-Many" Modes of Operation.. FSE, том 2887 из Lecture Notes in Computer Science, стр. 376-395. Springer, (2003)Multiple Differential Cryptanalysis of Round-Reduced PRINCE., , , , и . FSE, том 8540 из Lecture Notes in Computer Science, стр. 591-610. Springer, (2014)