Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Necessity of Exhaustive Search for System-Invariant Cryptanalysis., , and . CRYPTO, page 2-6. U. C. Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04, (1981)The two-armed-bandit problem with time-invariant finite memory., and . IEEE Trans. Inf. Theory, 16 (2): 185-195 (1970)On the necessity of cryptanalytic exhaustive search., , and . SIGACT News, 15 (1): 40-44 (1983)Cryptographic Key Size Issues.. COMPCON, page 130-132. IEEE Computer Society, (1982)Drainage and the DES., and . CRYPTO, page 129-131. Plenum Press, New York, (1982)Differential-Linear Cryptanalysis., and . CRYPTO, volume 839 of Lecture Notes in Computer Science, page 17-25. Springer, (1994)Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic.. ACM Conference on Computer and Communications Security, page 1-2. ACM, (2016)Security in communication networks.. AFIPS National Computer Conference, volume 47 of AFIPS Conference Proceedings, page 1131-1136. AFIPS Press, (1978)Multiuser cryptographic techniques., and . AFIPS National Computer Conference, volume 45 of AFIPS Conference Proceedings, page 109-112. AFIPS Press, (1976)An Overview of Public Key Cryptography. IEEE Communications Magazine, 16 (6): 24-32 (November 1978)