From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Linear Analysis of Reduced-Round CubeHash., и . IACR Cryptology ePrint Archive, (2010)Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds., , , , и . IACR Cryptology ePrint Archive, (2009)Improved Single-Key Attacks on 8-round AES., , и . IACR Cryptology ePrint Archive, (2010)A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony., , и . IACR Cryptology ePrint Archive, (2010)Reconstructing an S-box from its Difference Distribution Table., и . IACR Cryptology ePrint Archive, (2018)Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities., , , , и . CRYPTO (2), том 10992 из Lecture Notes in Computer Science, стр. 185-212. Springer, (2018)Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2., , , и . ASIACRYPT (1), том 8269 из Lecture Notes in Computer Science, стр. 337-356. Springer, (2013)A Simple Related-Key Attack on the Full SHACAL-1., , и . CT-RSA, том 4377 из Lecture Notes in Computer Science, стр. 20-30. Springer, (2007)A Unified Approach to Related-Key Attacks., , и . FSE, том 5086 из Lecture Notes in Computer Science, стр. 73-96. Springer, (2008)Linear Analysis of Reduced-Round CubeHash., и . ACNS, том 6715 из Lecture Notes in Computer Science, стр. 462-478. (2011)