From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Data acquisition methods using backup data decryption of Sony smartphones., , , , , и . Digital Investigation, (2019)Recent advanced applications and services for intelligent ubiquitous environments., , и . Electron. Commer. Res., 14 (3): 217-221 (2014)Speeding Up LAT: Generating a Linear Approximation Table Using a Bitsliced Implementation., , и . IEEE Access, (2022)An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks., , , , и . J. Supercomput., 70 (1): 224-235 (2014)Generating Cryptographic S-Boxes Using the Reinforcement Learning., , , , и . IEEE Access, (2021)Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments., , , и . J. Univers. Comput. Sci., 15 (5): 1007-1022 (2009)Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis., и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (9): 2588-2596 (2008)Higher order eTCR hash functions., , , и . Comput. Math. Appl., 65 (9): 1396-1402 (2013)Related-Key Boomerang and Rectangle Attacks., , , , , и . IACR Cryptology ePrint Archive, (2010)Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher., и . Cryptologia, 33 (3): 246-270 (2009)