From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Bellcore attack in practice., , , , и . IACR Cryptology ePrint Archive, (2012)Efficient Pseudorandom Generators Based on the DDH Assumption., , и . IACR Cryptology ePrint Archive, (2006)Extractors for binary elliptic curves., , и . Des. Codes Cryptogr., 49 (1-3): 171-186 (2008)Efficient Pseudorandom Generators Based on the DDH Assumption., , и . Public Key Cryptography, том 4450 из Lecture Notes in Computer Science, стр. 426-441. Springer, (2007)Concrete Security of the Blum-Blum-Shub Pseudorandom Generator., и . IMACC, том 3796 из Lecture Notes in Computer Science, стр. 355-375. Springer, (2005)State Recovery Attacks on Pseudorandom Generators., и . WEWoRC, том P-74 из LNI, стр. 53-63. GI, (2005)