Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hash Functions.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)MAA.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)NESSIE Project.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)MASH Hash Functions (Modular Arithmetic Secure Hash).. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)MDC-2 and MDC-4.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)On Encryption and Authentication of the DC DCT Coefficient., and . SIGMAP, page 375-379. INSTICC Press, (2007)Provoking security: Spoofing attacks against crypto-biometric systems., and . WorldCIS, page 67-72. IEEE, (2015)Symmetric Cryptography (Dagstuhl Seminar 16021)., , , and . Dagstuhl Reports, 6 (1): 34-54 (2016)Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base., , , , , , , , and . USENIX Security Symposium, page 479-494. USENIX Association, (2013)Software Security: Squaring the Circle?. SPRO@ICSE, page 1. IEEE Computer Society, (2015)