Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Near-Collision Attack on the Compression Function of Dynamic SHA2., and . IACR Cryptology ePrint Archive, (2009)How to Break MD5 and Other Hash Functions., and . EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, page 19-35. Springer, (2005)Finding Collisions in the Full SHA-1., , and . CRYPTO, volume 3621 of Lecture Notes in Computer Science, page 17-36. Springer, (2005)Field Identification of Cold Tolerance of High Oleic Acid Peanut at Germination Stage and Verification of Physiological Indices., , , , and . BIBE, page 9:1-9:5. ACM, (2020)Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256., , , and . IET Inf. Secur., 9 (3): 167-178 (2015)A Space-Time GIS Approach to Exploring Large Individual-based Spatiotemporal Datasets., , and . Trans. GIS, 12 (4): 425-441 (2008)Exploring potential human activities in physical and virtual spaces: a spatio-temporal GIS approach., and . Int. J. Geogr. Inf. Sci., 22 (4): 409-430 (2008)Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA., and . ISC, volume 7807 of Lecture Notes in Computer Science, page 155-168. Springer, (2013)Cryptanalysis of Reduced-Round SipHash., and . IACR Cryptology ePrint Archive, (2019)Neural representations of vicarious rewards are linked to interoception and prosocial behaviour., , , , , , , , and . NeuroImage, (April 2023)