Straipsniai su viešo pasiekiamumo įpareigojimais - Eran LambooijSužinokite daugiau
Niekur nepasiekiama: 1
Counting Active S-Boxes is not Enough
O Dunkelman, A Kumar, E Lambooij, SK Sanadhya
International Conference on Cryptology in India, 332-344, 2020
Įpareigojimai: Department of Science & Technology, India
Kur nors pasiekiama: 4
How to Manipulate Curve Standards: A White Paper for the Black Hat http://bada55.cr.yp.to
DJ Bernstein, T Chou, C Chuengsatiansup, A Hülsing, E Lambooij, ...
International Conference on Research in Security Standardisation, 109-139, 2015
Įpareigojimai: Netherlands Organisation for Scientific Research, European Commission
How to Build Pseudorandom Functions from Public Random Permutations
YL Chen, E Lambooij, B Mennink
Annual International Cryptology Conference, 266-293, 2019
Įpareigojimai: Research Foundation (Flanders), Netherlands Organisation for Scientific Research
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
R Ankele, C Dobraunig, J Guo, E Lambooij, G Leander, Y Todo
IACR Transactions on Symmetric Cryptology, 192-235, 2019
Įpareigojimai: Austrian Science Fund, European Commission
A Practical Forgery Attack on Lilliput-AE
O Dunkelman, N Keller, E Lambooij, Y Sasaki
Journal of Cryptology, 1-7, 2019
Įpareigojimai: European Commission
Leidyklos ir finansavimo informaciją automatiškai nustato kompiuterio programa