From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures., , и . ICISC, том 2015 из Lecture Notes in Computer Science, стр. 1-13. Springer, (2000)Elliptic Curves and Resilient Functions., и . ICISC, том 2015 из Lecture Notes in Computer Science, стр. 64-72. Springer, (2000)On the Security of Reduced Versions of 3-Pass HAVAL., , , и . ACISP, том 2384 из Lecture Notes in Computer Science, стр. 406-419. Springer, (2002)Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98., , и . FSE, том 2365 из Lecture Notes in Computer Science, стр. 252-262. Springer, (2002)Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines., , , и . FSE, том 3017 из Lecture Notes in Computer Science, стр. 193-209. Springer, (2004)Global Avalanche Characteristics and Nonlinearity of Balanced Boolean Functions., , , и . Inf. Process. Lett., 65 (3): 139-144 (1998)How to construct balanced Boolean functions with good global avalanche characteristics., , , и . ICISC, стр. 121-130. Korea Institute of Information Security and Cryptology (KIISC), (1998)Analysis of Layered ROLLO-I., , , , , и . IACR Cryptol. ePrint Arch., (2024)New Block Cipher: ARIA., , , , , , , , , и 3 other автор(ы). ICISC, том 2971 из Lecture Notes in Computer Science, стр. 432-445. Springer, (2003)A note on digital signature scheme using a self-pairing map., и . Appl. Math. Comput., 169 (1): 472-475 (2005)