Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a., and . IACR Cryptology ePrint Archive, (2017)A New Chosen IV Statistical Attack on Grain-128a Cipher., and . CyberC, page 58-62. IEEE, (2017)Cryptanalysis of GSM encryption algorithm A5/1., , and . ISeCure, 4 (2): 107-114 (2012)A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a., and . J. Ambient Intell. Humaniz. Comput., 10 (6): 2393-2400 (2019)A new idea in response to fast correlation attacks on small-state stream ciphers., , and . Microprocess. Microsystems, (February 2023)Necessary conditions for designing secure stream ciphers with the minimal internal states., , and . IACR Cryptology ePrint Archive, (2017)A new idea in response to fast correlation attacks on small-state stream ciphers., and . IACR Cryptol. ePrint Arch., (2020)An Attack on a Proposed Construction of Small-State Stream Ciphers and Proposals for New Constructions., and . Comput. J., 67 (1): 169-178 (January 2024)On designing secure small-state stream ciphers against time-memory-data tradeoff attacks., , and . IACR Cryptology ePrint Archive, (2019)Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments., and . Entropy, 20 (3): 180 (2018)