From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Weaknesses in a Randomized Stream Cipher., , и . ACISP, том 1841 из Lecture Notes in Computer Science, стр. 234-241. Springer, (2000)Nonsecurity Considerations in Security Decisions.. IEEE Secur. Priv., 5 (3): 88 (2007)Cryptography Is Harder than It Looks.. IEEE Secur. Priv., 14 (1): 87-88 (2016)The Death of the Security Industry.. IEEE Secur. Priv., 5 (6): 88 (2007)Technologists vs. Policy Makers.. IEEE Secur. Priv., 18 (1): 72-71 (2020)Authentication and Expiration.. IEEE Secur. Priv., 3 (1): 88 (2005)Cybersecurity for the Public Interest.. IEEE Secur. Priv., 17 (1): 84-83 (2019)Cryptanalysis of TWOPRIME., , , и . FSE, том 1372 из Lecture Notes in Computer Science, стр. 32-48. Springer, (1998)Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish).. FSE, том 809 из Lecture Notes in Computer Science, стр. 191-204. Springer, (1993)Mod n Cryptanalysis, with Applications Against RC5P and M6., , и . FSE, том 1636 из Lecture Notes in Computer Science, стр. 139-155. Springer, (1999)