From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Relation between XL algorithm and Gröbner Bases Algorithms., , и . IACR Cryptology ePrint Archive, (2004)An improvement of discrete Tardos fingerprinting codes., , , , , , и . IACR Cryptology ePrint Archive, (2008)On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?, , , и . IACR Cryptology ePrint Archive, (2003)On advanced cryptographic techniques for information security of smart grid AMI., , , , и . CSIIRW, стр. 64. ACM, (2011)On Channel Capacity and Modulation of Watermarks in Digital Still Images., и . Financial Cryptography, том 1648 из Lecture Notes in Computer Science, стр. 125-139. Springer, (1999)Improvements on Security Proofs of Some Identity Based Encryption Schemes., и . CISC, том 3822 из Lecture Notes in Computer Science, стр. 28-41. Springer, (2005)A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange., , и . EuroPKI, том 3545 из Lecture Notes in Computer Science, стр. 191-205. Springer, (2005)Chosen Ciphertext Secure Public Key Encryption with a Simple Structure., , , и . IWSEC, том 5312 из Lecture Notes in Computer Science, стр. 20-33. Springer, (2008)Algebraic Cryptanalysis of 58-Round SHA-1., , , и . FSE, том 4593 из Lecture Notes in Computer Science, стр. 349-365. Springer, (2007)A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function., , , , и . ProvSec, том 4784 из Lecture Notes in Computer Science, стр. 68-84. Springer, (2007)