Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Loiss: A Byte-Oriented Stream Cipher., , , , and . IACR Cryptology ePrint Archive, (2010)Complete permutation polynomials with the form (xpm-x+δ)s+axpm+bx over Fpn., , and . Finite Fields Their Appl., (2019)On Guess and Determine Analysis of Rabbit., , , and . Int. J. Found. Comput. Sci., 22 (6): 1283-1296 (2011)Loiss: A Byte-Oriented Stream Cipher., , , , and . IWCC, volume 6639 of Lecture Notes in Computer Science, page 109-125. Springer, (2011)Linear Approximations of Addition Modulo 2n-1., , and . FSE, volume 6733 of Lecture Notes in Computer Science, page 359-377. Springer, (2011)Straightforward Guess and Determine Analysis Based on Genetic Algorithm., , , , and . J. Syst. Sci. Complex., 35 (5): 1988-2003 (2022)On Two Factors Affecting the Efficiency of MILP Models in Automated Cryptanalyses., , and . IACR Cryptol. ePrint Arch., (2023)Fault Attack on ACORN v3., , and . IACR Cryptology ePrint Archive, (2017)A practical forgery and state recovery attack on the authenticated cipher PANDA-s., , and . IACR Cryptology ePrint Archive, (2014)The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited., , , , and . Des. Codes Cryptogr., 91 (5): 1889-1910 (May 2023)