Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Necessity of Exhaustive Search for System-Invariant Cryptanalysis., , and . CRYPTO, page 2-6. U. C. Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04, (1981)The two-armed-bandit problem with time-invariant finite memory., and . IEEE Trans. Inf. Theory, 16 (2): 185-195 (1970)On the necessity of cryptanalytic exhaustive search., , and . SIGACT News, 15 (1): 40-44 (1983)Drainage and the DES., and . CRYPTO, page 129-131. Plenum Press, New York, (1982)Differential-Linear Cryptanalysis., and . CRYPTO, volume 839 of Lecture Notes in Computer Science, page 17-25. Springer, (1994)Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic.. ACM Conference on Computer and Communications Security, page 1-2. ACM, (2016)Cryptographic Key Size Issues.. COMPCON, page 130-132. IEEE Computer Society, (1982)An Overview of Public Key Cryptography. IEEE Communications Magazine, 16 (6): 24-32 (November 1978)On the Security of Multiple Encryption., and . Commun. ACM, 24 (7): 465-467 (1981)An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance., and . Democratizing Cryptography, volume 42 of ACM Books, ACM, (2022)