Author of the publication

Analysis of Neural Cryptography.

, , and . ASIACRYPT, volume 2501 of Lecture Notes in Computer Science, page 288-298. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations., , , and . EUROCRYPT, volume 1807 of Lecture Notes in Computer Science, page 392-407. Springer, (2000)Cryptographic Applications of T-Functions., and . Selected Areas in Cryptography, volume 3006 of Lecture Notes in Computer Science, page 248-261. Springer, (2003)New Cryptographic Primitives Based on Multiword T-Functions., and . FSE, volume 3017 of Lecture Notes in Computer Science, page 1-15. Springer, (2004)New Applications of T-Functions in Block Ciphers and Hash Functions., and . FSE, volume 3557 of Lecture Notes in Computer Science, page 18-31. Springer, (2005)A New Class of Invertible Mappings., and . CHES, volume 2523 of Lecture Notes in Computer Science, page 470-483. Springer, (2002)Global circulation patterns of seasonal influenza viruses vary with antigenic drift., , , , , , , , , and 16 other author(s). Nat., 523 (7559): 217-220 (2015)Rectification and NIR photoresponse in p-Si/phthalocyanine/metal heterostructures., , and . Microelectron. J., 38 (6-7): 682-685 (2007)