From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Algebraic analysis of Trivium-like ciphers (Poster)., , , , и . AISC, том 149 из CRPIT, стр. 77-81. Australian Computer Society, (2014)Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS., , , , , и . TrustCom/BigDataSE/ICESS, стр. 961-966. IEEE Computer Society, (2017)Twisted Edwards Curves Revisited., , , и . ASIACRYPT, том 5350 из Lecture Notes in Computer Science, стр. 326-343. Springer, (2008)Jacobi Quartic Curves Revisited., , , и . ACISP, том 5594 из Lecture Notes in Computer Science, стр. 452-468. Springer, (2009)Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output., , , и . ATIS, том 1338 из Communications in Computer and Information Science, стр. 42-60. Springer, (2020)Differential Random Fault Attacks on Certain CAESAR Stream Ciphers., , , и . ICISC, том 11975 из Lecture Notes in Computer Science, стр. 297-315. Springer, (2019)State convergence in the initialisation of the Sfinks stream cipher., , , , и . AISC, том 125 из CRPIT, стр. 27-32. Australian Computer Society, (2012)Fault attacks on Tiaoxin-346., , , , , и . ACSW, стр. 5:1-5:9. ACM, (2018)Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN., , , , , и . ATIS, том 651 из Communications in Computer and Information Science, стр. 15-26. (2016)A General Model for MAC Generation Using Direct Injection., , , , и . Inscrypt, том 7763 из Lecture Notes in Computer Science, стр. 198-215. Springer, (2012)