From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Ten Years of Information Security Masters Programmes., , , и . World Conference on Information Security Education, том 253 из IFIP Conference Proceedings, стр. 215-230. Kluwer, (2003)On Identity-Based Cryptography and Grid Computing., и . International Conference on Computational Science, том 3036 из Lecture Notes in Computer Science, стр. 474-477. Springer, (2004)Essential Algebraic Structure within the AES., и . CRYPTO, том 2442 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2002)Combining Compression Functions and Block Cipher-Based Hash Functions., , , и . ASIACRYPT, том 4284 из Lecture Notes in Computer Science, стр. 315-331. Springer, (2006)Small Scale Variants of the AES., , и . FSE, том 3557 из Lecture Notes in Computer Science, стр. 145-162. Springer, (2005)On Building Hash Functions from Multivariate Quadratic Equations., , и . ACISP, том 4586 из Lecture Notes in Computer Science, стр. 82-95. Springer, (2007)On Unbiased Linear Approximations., и . ACISP, том 6168 из Lecture Notes in Computer Science, стр. 74-86. Springer, (2010)Non-Linear Approximations in Linear Cryptanalysis., и . EUROCRYPT, том 1070 из Lecture Notes in Computer Science, стр. 224-236. Springer, (1996)On Related-Key Attacks and KASUMI: The Case of A5/3., , и . INDOCRYPT, том 7107 из Lecture Notes in Computer Science, стр. 146-159. Springer, (2011)The Intel AES Instructions Set and the SHA-3 Candidates., , , и . ASIACRYPT, том 5912 из Lecture Notes in Computer Science, стр. 162-178. Springer, (2009)