Author of the publication

On Exact Algebraic Non-Immunity of S-Boxes Based on Power Functions.

, , and . ACISP, volume 4058 of Lecture Notes in Computer Science, page 76-86. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator., and . FSE, volume 5086 of Lecture Notes in Computer Science, page 235-252. Springer, (2008)Decimv2., , , , , , , , , and 3 other author(s). The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)On Exact Algebraic Non-Immunity of S-boxes Based on Power Functions., , and . IACR Cryptol. ePrint Arch., (2005)Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts., and . WEWoRC, volume 4945 of Lecture Notes in Computer Science, page 100-113. Springer, (2007)On Exact Algebraic Non-Immunity of S-Boxes Based on Power Functions., , and . ACISP, volume 4058 of Lecture Notes in Computer Science, page 76-86. Springer, (2006)Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking.. CHES, volume 7428 of Lecture Notes in Computer Science, page 107-121. Springer, (2012)Analysis of the Bit-Search Generator and Sequence Compression Techniques., , , , , and . FSE, volume 3557 of Lecture Notes in Computer Science, page 196-214. Springer, (2005)Fault Analysis of the Stream Cipher Snow 3G., and . FDTC, page 103-110. IEEE Computer Society, (2009)Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0.., and . ICICS, volume 5308 of Lecture Notes in Computer Science, page 328-344. Springer, (2008)