Author of the publication

Cryptanalysis of ORYX.

, , , , , and . Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 296-305. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolutionary generation of bent functions for cryptography., , and . IEEE Congress on Evolutionary Computation, page 1655-1661. IEEE, (2003)Dragon: A Fast Word Based Stream Cipher., , , , , , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 33-50. Springer, (2004)Cryptanalysis of the alleged CAVE algorithm.. ICISC, page 107-119. Korea Institute of Information Security and Cryptology (KIISC), (1998)Strengthening the Key Schedule of the AES., , , , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 226-240. Springer, (2002)New Cryptographic Applications of Boolean Function Equivalence Classes.. ACISP, volume 3574 of Lecture Notes in Computer Science, page 572-583. Springer, (2005)How to Improve the Nonlinearity of Bijective S-Boxes.. ACISP, volume 1438 of Lecture Notes in Computer Science, page 181-192. Springer, (1998)Linear Redundancy in S-Boxes., and . FSE, volume 2887 of Lecture Notes in Computer Science, page 74-86. Springer, (2003)New Concepts in Evolutionary Search for Boolean Functions in Cryptology., , and . Comput. Intell., 20 (3): 463-474 (2004)New concepts in evolutionary search for Boolean functions in cryptology., , and . IEEE Congress on Evolutionary Computation, page 2157-2164. IEEE, (2003)Cryptanalysis of the cellular authentication and voice encryption algorithm., and . IEICE Electron. Express, 1 (15): 453-459 (2004)