Author of the publication

A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher.

, , , , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 418-431. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolutionary generation of bent functions for cryptography., , and . IEEE Congress on Evolutionary Computation, page 1655-1661. IEEE, (2003)Dragon: A Fast Word Based Stream Cipher., , , , , , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 33-50. Springer, (2004)How to Improve the Nonlinearity of Bijective S-Boxes.. ACISP, volume 1438 of Lecture Notes in Computer Science, page 181-192. Springer, (1998)Strengthening the Key Schedule of the AES., , , , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 226-240. Springer, (2002)New Cryptographic Applications of Boolean Function Equivalence Classes.. ACISP, volume 3574 of Lecture Notes in Computer Science, page 572-583. Springer, (2005)Linear Redundancy in S-Boxes., and . FSE, volume 2887 of Lecture Notes in Computer Science, page 74-86. Springer, (2003)Cryptanalysis of the alleged CAVE algorithm.. ICISC, page 107-119. Korea Institute of Information Security and Cryptology (KIISC), (1998)New Concepts in Evolutionary Search for Boolean Functions in Cryptology., , and . Comput. Intell., 20 (3): 463-474 (2004)New concepts in evolutionary search for Boolean functions in cryptology., , and . IEEE Congress on Evolutionary Computation, page 2157-2164. IEEE, (2003)A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher., , , , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 418-431. Springer, (2003)