From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Practical Attacks on AES-like Cryptographic Hash Functions., и . LATINCRYPT, том 8895 из Lecture Notes in Computer Science, стр. 259-273. Springer, (2014)Troika: a ternary cryptographic hash function., , , и . Des. Codes Cryptogr., 88 (1): 91-117 (2020)Design and Development of a Knee Rehabilitation Exoskeleton with Four-Bar Linkage Actuation., , , и . CoDIT, стр. 1618-1623. IEEE, (2023)Differential Cryptanalysis of Keccak Variants., , , и . IMACC, том 8308 из Lecture Notes in Computer Science, стр. 141-157. Springer, (2013)Finding Integral Distinguishers with Ease., , , и . SAC, том 11349 из Lecture Notes in Computer Science, стр. 115-138. Springer, (2018)Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis., и . SAC, том 11349 из Lecture Notes in Computer Science, стр. 163-190. Springer, (2018)State-Recovery Analysis of Spritz., , и . LATINCRYPT, том 9230 из Lecture Notes in Computer Science, стр. 204-221. Springer, (2015)Hybrid Post-quantum Signatures in Hardware Security Keys., , , , , , , , и . ACNS Workshops, том 13907 из Lecture Notes in Computer Science, стр. 480-499. Springer, (2023)Security of the AES with a Secret S-Box., , , и . FSE, том 9054 из Lecture Notes in Computer Science, стр. 175-189. Springer, (2015)Observations on the SIMON Block Cipher Family., , и . CRYPTO (1), том 9215 из Lecture Notes in Computer Science, стр. 161-185. Springer, (2015)