From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model., , , и . AFRICACRYPT, том 7918 из Lecture Notes in Computer Science, стр. 140-155. Springer, (2013)On Immunity Profile of Boolean Functions., , и . SETA, том 4086 из Lecture Notes in Computer Science, стр. 364-375. Springer, (2006)Flatness and Submersivity of Discrete-Time Dynamical Systems., и . IEEE Control. Syst. Lett., 4 (2): 337-342 (2020)Cryptanalysis of Nonlinear Filter Generators with 0, 1-Metric Viterbi Decoding., , , и . IMACC, том 2260 из Lecture Notes in Computer Science, стр. 402-414. Springer, (2001)A New Representation of Boolean Functions., и . AAECC, том 1719 из Lecture Notes in Computer Science, стр. 94-103. Springer, (1999)Bent, resilient functions and the numerical normal form., и . Codes and Association Schemes, том 56 из DIMACS Series in Discrete Mathematics and Theoretical Computer Science, стр. 87-96. DIMACS/AMS, (1999)Soldiers to the rescue, и . OECD, Paris, (1996)A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function., , , и . Selected Areas in Cryptography, том 2595 из Lecture Notes in Computer Science, стр. 232-249. Springer, (2002)