Author of the publication

Cryptanalysis of ORYX.

, , , , , and . Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 296-305. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Indirect message injection for MAC generation., , , , and . J. Math. Cryptol., 7 (3): 253-277 (2013)Speech encryption using discrete orthogonal transforms., , and . ICASSP, page 1647-1650. IEEE, (1990)New concepts in evolutionary search for Boolean functions in cryptology., , and . IEEE Congress on Evolutionary Computation, page 2157-2164. IEEE, (2003)A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher., , , , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 418-431. Springer, (2003)State convergence and the effectiveness of time-memory-data tradeoffs., , , and . IAS, page 92-97. IEEE, (2011)Signature Scheme for Controlled Environments., , and . ICICS, volume 1726 of Lecture Notes in Computer Science, page 119-134. Springer, (1999)Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond., and . ACISP, volume 4058 of Lecture Notes in Computer Science, page 52-63. Springer, (2006)New Concepts in Evolutionary Search for Boolean Functions in Cryptology., , and . Comput. Intell., 20 (3): 463-474 (2004)Authorization models for secure information sharing: a survey and research agenda., , and . ISeCure, 2 (2): 69-87 (2010)Key Recovery System for the Commercial Environment., , , and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 149-162. Springer, (2000)