Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Logic Minimization Techniques with Applications to Cryptology., , and . J. Cryptol., 26 (2): 280-312 (2013)On the Communication Complexity of Zero-Knowledge Proofs., , and . J. Cryptol., 6 (2): 65-85 (1993)Computation in networks of passively mobile finite-state sensors., , , , and . Distributed Comput., 18 (4): 235-253 (2006)Analysis of e-commerce protocols: Adapting a traditional technique., , and . Int. J. Inf. Sec., 2 (1): 21-36 (2003)Secure sealed-bid online auctions using discreet cryptographic proofs., , , and . Math. Comput. Model., 57 (11-12): 2583-2595 (2013)On the Multiplicative Complexity of Cubic Boolean Functions., and . IACR Cryptol. ePrint Arch., (2021)Searching the space of tower field implementations of the 픽28 inverter - with applications to AES, Camellia and SM4., , , , and . Int. J. Inf. Comput. Secur., 20 (1/2): 1-26 (2023)A Small Depth-16 Circuit for the AES S-Box., and . SEC, volume 376 of IFIP Advances in Information and Communication Technology, page 287-298. Springer, (2012)Validation of Cryptographic Protocols by Efficient Automated Testing., and . FLAIRS, page 7-12. AAAI Press, (2000)On the Concrete Complexity of Zero-Knowledge Proofs., and . CRYPTO, volume 435 of Lecture Notes in Computer Science, page 507-525. Springer, (1989)