From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Survey and Guideline on Privacy Enhancing Technologies for Collaborative Machine Learning., , , и . IEEE Access, (2022)Secure Aggregation Against Malicious Users., , и . SACMAT, стр. 115-124. ACM, (2021)A Security-Friendly Privacy Solution for Federated Learning., , , , , и . AI6G@WCCI, том 3189 из CEUR Workshop Proceedings, CEUR-WS.org, (2022)Cryptanalysis of QTL Block Cipher., , и . LightSec, том 10098 из Lecture Notes in Computer Science, стр. 60-68. Springer, (2016)Biclique Cryptanalysis of TWINE., , и . CANS, 7712, стр. 43-55. Springer, (2012)Biclique cryptanalysis of LBlock and TWINE., , и . Inf. Process. Lett., 113 (12): 423-429 (2013)A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher., , и . IACR Cryptol. ePrint Arch., (2015)ITUbee: A Software Oriented Lightweight Block Cipher., , и . LightSec, том 8162 из Lecture Notes in Computer Science, стр. 16-27. Springer, (2013)Multidimensional Meet-in-the-Middle Attacks on Reduced-Round TWINE-128., , и . LightSec, том 8162 из Lecture Notes in Computer Science, стр. 55-67. Springer, (2013)Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher., , и . Selected Areas in Cryptography, том 7118 из Lecture Notes in Computer Science, стр. 169-184. Springer, (2011)