From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Consistent High Dimensional Rounding with Side Information., , , , , , и . CoRR, (2020)New Attacks on IDEA with at Least 6 Rounds., , , и . J. Cryptol., 28 (2): 209-239 (2015)A Practical Attack on KeeLoq., , , , , , , , , и . J. Cryptol., 25 (1): 136-157 (2012)An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing., , и . J. Cryptol., 33 (3): 824-873 (2020)On a biased edge isoperimetric inequality for the discrete cube., , и . J. Comb. Theory, Ser. A, (2019)A Unified Approach to Related-Key Attacks., , и . FSE, том 5086 из Lecture Notes in Computer Science, стр. 73-96. Springer, (2008)Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities., , , , и . CRYPTO (2), том 10992 из Lecture Notes in Computer Science, стр. 185-212. Springer, (2018)A 2^70 Attack on the Full MISTY1., и . CRYPTO (1), том 9814 из Lecture Notes in Computer Science, стр. 435-456. Springer, (2016)A Simple Related-Key Attack on the Full SHACAL-1., , и . CT-RSA, том 4377 из Lecture Notes in Computer Science, стр. 20-30. Springer, (2007)Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2., , , и . ASIACRYPT (1), том 8269 из Lecture Notes in Computer Science, стр. 337-356. Springer, (2013)