Author of the publication

Results on significant anomalies of state values after key scheduling algorithm in RC4.

. IET Inf. Secur., 11 (5): 267-272 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An 8-bit 500 MSPS segmented current steering DAC using Chinese abacus technique., and . VDAT, page 1-2. IEEE, (2016)Some applications of lattice based root finding techniques., and . Adv. in Math. of Comm., 4 (4): 519-531 (2010)Cryptanalysis of RSA with more than one decryption exponent., and . Inf. Process. Lett., 110 (8-9): 336-340 (2010)Risk Analysis of Green Supply Chain Using a Hybrid Multi-Criteria Decision Model: Evidence from Laptop Manufacturer Industry., , , , and . Axioms, 11 (12): 668 (2022)New Cryptanalysis of ZUC-256 Initialization Using Modular Differences., , , , , and . IACR Trans. Symmetric Cryptol., 2022 (3): 152-190 (2022)Reduction in Lossiness of RSA Trapdoor Permutation.. SPACE, volume 7644 of Lecture Notes in Computer Science, page 144-152. Springer, (2012)Some Results on Related Key-IV Pairs of Grain., , and . SPACE, volume 7644 of Lecture Notes in Computer Science, page 94-110. Springer, (2012)A Differential Fault Attack on Grain-128a Using MACs., , and . SPACE, volume 7644 of Lecture Notes in Computer Science, page 111-125. Springer, (2012)Differential Fault Attack on Grain v1, ACORN v3 and Lizard., , , and . SPACE, volume 10662 of Lecture Notes in Computer Science, page 247-263. Springer, (2017)A New Distinguisher on Grain v1 for 106 Rounds.. ICISS, volume 9478 of Lecture Notes in Computer Science, page 334-344. Springer, (2015)