From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Software Benchmarking of the 2nd round CAESAR Candidates., и . IACR Cryptology ePrint Archive, (2016)Analysis of lightweight and efficient symmetric-key primitives.. Royal Holloway, University of London, Egham, UK, (2018)British Library, EThOS.State-Recovery Analysis of Spritz., , и . LATINCRYPT, том 9230 из Lecture Notes in Computer Science, стр. 204-221. Springer, (2015)Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis., и . SAC, том 11349 из Lecture Notes in Computer Science, стр. 163-190. Springer, (2018)Differential Cryptanalysis of Round-Reduced Sparx-64/128., и . ACNS, том 10892 из Lecture Notes in Computer Science, стр. 459-475. Springer, (2018)Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing., , , и . ARES, стр. 102:1-102:8. ACM, (2019)Related-Key Impossible-Differential Attack on Reduced-Round Skinny., , , , , , и . ACNS, том 10355 из Lecture Notes in Computer Science, стр. 208-228. Springer, (2017)