Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP., and . FGIT-SecTech/DRBC, volume 122 of Communications in Computer and Information Science, page 39-46. Springer, (2010)Probability distributions for the Linux entropy estimator., and . Discrete Applied Mathematics, (2018)A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations., , , and . WISTP, volume 8501 of Lecture Notes in Computer Science, page 10-23. Springer, (2014)A Concrete Security Analysis for 3GPP-MAC., , , and . FSE, volume 2887 of Lecture Notes in Computer Science, page 154-169. Springer, (2003)On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis., , , and . ICISC, volume 1787 of Lecture Notes in Computer Science, page 38-52. Springer, (1999)Practical Multi-party Versions of Private Set Intersection Protocols with Hardware Tokens., , , and . FGIT-FGCN/DCA, volume 350 of Communications in Computer and Information Science, page 72-79. Springer, (2012)Practical True Random Number Generator Using CMOS Image Sensor Dark Noise., , , , , , , and . IEEE Access, (2019)Recoverable Random Numbers in an Internet of Things Operating System., , and . Entropy, 19 (3): 113 (2017)An efficient key distribution scheme with self-healing property., and . IEEE Communications Letters, 9 (8): 759-761 (2005)On Fast Private Scalar Product Protocols., and . FGIT-SecTech, volume 259 of Communications in Computer and Information Science, page 1-10. Springer, (2011)