From post

Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery.

, , , , , , и . ASIACRYPT (1), том 13791 из Lecture Notes in Computer Science, стр. 410-440. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof., , , и . IACR Cryptology ePrint Archive, (2014)Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes., и . IACR Cryptology ePrint Archive, (2010)Emerging services and technologies in wireless networks., , и . J. High Speed Networks, 21 (2): 81-82 (2015)A note on the security of KHL scheme., , , , , и . Theor. Comput. Sci., (2015)Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources"., , , и . IEEE Trans. Inf. Forensics Secur., (2020)On Low-complexity Lattice Reduction Algorithms for Large-scale MIMO Detection: the Blessing of Sequential Reduction., , , и . CoRR, (2019)An Overview on Smart Contracts: Challenges, Advances and Platforms., , , , , , и . CoRR, (2019)A Two-Layer Nonlinear Combination Method for Short-Term Wind Speed Prediction Based on ELM, ENN, and LSTM., , , и . IEEE Internet of Things Journal, 6 (4): 6997-7010 (2019)Predicate Private Set Intersection with Linear Complexity., , , , , и . ACNS, том 13906 из Lecture Notes in Computer Science, стр. 143-166. Springer, (2023)Fusion: Efficient and Secure Inference Resilient to Malicious Servers., , , , , , , и . NDSS, The Internet Society, (2023)