From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A White-Box Speck Implementation Using Self-equivalence Encodings., , и . ACNS, том 13269 из Lecture Notes in Computer Science, стр. 771-791. Springer, (2022)T-HIBE: A Novel Key Establishment Solution for Decentralized, Multi-Tenant IoT Systems., , и . CCNC, стр. 766-774. IEEE, (2022)Cryptanalysis of SPEEDY., , , , , и . ACISP, том 13915 из Lecture Notes in Computer Science, стр. 124-156. Springer, (2023)Cryptographic Primitives for Information Authentication - State of the Art. State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures, стр. 49-104. London, UK, Springer-Verlag, (1998)Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401)., , , и . Dagstuhl Manifestos, 5 (1): 25-37 (2015)Location privacy in wireless personal area networks., и . Workshop on Wireless Security, стр. 11-18. ACM, (2006)Identification via location-profiling in GSM networks., , , и . WPES, стр. 23-32. ACM, (2008)A fast dual-field modular arithmetic logic unit and its hardware implementation., , и . ISCAS, IEEE, (2006)Technologies for controlled anonymity, , , , , , , , , и 1 other автор(ы). Deliverable 10. Anonymity and Privacy in Electronic Services, (2003)Hash Functions Based on Block Ciphers: A Synthetic Approach., , и . CRYPTO, том 773 из Lecture Notes in Computer Science, стр. 368-378. Springer, (1993)