From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Modeling for Three-Subset Division Property without Unknown Subset., , , , и . IACR Cryptology ePrint Archive, (2020)Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD., , , , и . EUROCRYPT (1), том 12105 из Lecture Notes in Computer Science, стр. 466-495. Springer, (2020)Correlation Properties of Combiners with Memory in Stream Ciphers., и . EUROCRYPT, том 473 из Lecture Notes in Computer Science, стр. 204-213. Springer, (1990)First demonstration of a post-quantum key-exchange with a nanosatellite., , , , , и . CoRR, (2022)Fast Correlation Attacks on Stream Ciphers (Extended Abstract)., и . EUROCRYPT, том 330 из Lecture Notes in Computer Science, стр. 301-314. Springer, (1988)Analysis of Multivariate Hash Functions., и . ICISC, том 4817 из Lecture Notes in Computer Science, стр. 309-323. Springer, (2007)Fast Correlation Attacks: Methods and Countermeasures.. FSE, том 6733 из Lecture Notes in Computer Science, стр. 55-67. Springer, (2011)The Hash Function Family LAKE., , и . FSE, том 5086 из Lecture Notes in Computer Science, стр. 36-53. Springer, (2008)Coefficient Grouping: Breaking Chaghri and More., , , , и . IACR Cryptol. ePrint Arch., (2022)Algebraic Attacks on Round-Reduced Keccak/Xoodoo., , , и . IACR Cryptol. ePrint Arch., (2020)