From post

Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically).

, , и . ASIACRYPT, том 1514 из Lecture Notes in Computer Science, стр. 380-391. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On Some Applications of Hadamard Matrices, , и . Metrika, 62 (2-3): 221--239 (2005)Key Scheduling In Des Type Cryptosystems., и . AUSCRYPT, том 453 из Lecture Notes in Computer Science, стр. 221-228. Springer, (1990)Values of Minors of an Infinite Family of D-Optimal Designs and Their Application to the Growth Problem., , и . SIAM J. Matrix Anal. Appl., 23 (1): 1-14 (2001)Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI., , , и . ASIACRYPT, том 739 из Lecture Notes in Computer Science, стр. 36-50. Springer, (1991)A Five-Round Algebraic Property of the Advanced Encryption Standard., , и . ISC, том 5222 из Lecture Notes in Computer Science, стр. 316-330. Springer, (2008)A Construction for 0, 1, -1 Orthogonal Matrices Visualized., и . IWOCA, том 10765 из Lecture Notes in Computer Science, стр. 47-57. Springer, (2017)A Generalized Algorithm for the Generation of Correlated Rayleigh Fading Envelopes., , , и . WOWMOM, стр. 213-218. IEEE Computer Society, (2005)On the Security of NOEKEON against Side Channel Cube Attacks., , , и . ISPEC, том 6047 из Lecture Notes in Computer Science, стр. 45-55. Springer, (2010)Cryptography: An Introduction to Computer Security (Advances in Computer Science Series), и . Prentice-Hall (Australia), (1989)Boolean Functions with Good Properties., , и . Security and Management, стр. 294-299. CSREA Press, (2004)