From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Combinatorics of Product Scanning Multiplication and Squaring., и . CSCML, том 10332 из Lecture Notes in Computer Science, стр. 99-114. Springer, (2017)RSA-Based Auto-recoverable Cryptosystems., и . Public Key Cryptography, том 1751 из Lecture Notes in Computer Science, стр. 326-341. Springer, (2000)A Weakness in Smart Card PKI Certification.. IAW, стр. 30-34. IEEE, (2003)Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts., и . ACISP, том 2727 из Lecture Notes in Computer Science, стр. 297-311. Springer, (2003)Auto-Recoverable Auto-Certifiable Cryptosystems., и . EUROCRYPT, том 1403 из Lecture Notes in Computer Science, стр. 17-31. Springer, (1998)Malicious Cryptography: Kleptographic Aspects., и . CT-RSA, том 3376 из Lecture Notes in Computer Science, стр. 7-18. Springer, (2005)Sliding Encryption: A Cryptographic Tool for Mobile Agents., и . FSE, том 1267 из Lecture Notes in Computer Science, стр. 230-241. Springer, (1997)Auto-recoverable Auto-certifiable Cryptosystems (A Survey)., и . CQRE, том 1740 из Lecture Notes in Computer Science, стр. 204-218. Springer, (1999)Non-Zero Sum Games and Survivable Malware.. IAW, стр. 24-29. IEEE, (2003)A PVSS as Hard as Discrete Log and Shareholder Separability., и . Public Key Cryptography, том 1992 из Lecture Notes in Computer Science, стр. 287-299. Springer, (2001)