Author of the publication

On A Fast Correlation Attack on Certain Stream Ciphers.

, and . EUROCRYPT, volume 547 of Lecture Notes in Computer Science, page 176-185. Springer, (1991)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Keyed logic BIST for Trojan detection in SoC., , , and . ISSoC, page 1-4. IEEE, (2014)A Digital Signature Scheme Based on Random Error-Correcting Codes., , and . IMACC, volume 1355 of Lecture Notes in Computer Science, page 161-167. Springer, (1997)On A²-Codes Including Arbiter's Attacks., and . EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 456-460. Springer, (1994)On the construction of cartesian authentication codes over symplectic spaces., , and . IEEE Trans. Inf. Theory, 40 (3): 920-929 (1994)Unconditionally Secure Group Authentication., , and . Des. Codes Cryptogr., 14 (3): 281-296 (1998)Authentication., and . Encyclopedia of Cryptography and Security, Springer, (2005)On the Use of the Binary Multiplying Channel in a Private Communication System.. EUROCRYPT, volume 209 of Lecture Notes in Computer Science, page 339-348. Springer, (1984)Multialphabet coding with separate alphabet description., , and . SEQUENCES, page 56-65. IEEE, (1997)Weighting of Double Exponential Distributed Data in Lossless Image Compression., and . Data Compression Conference, page 543. IEEE Computer Society, (1998)A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers., , and . FSE, volume 1978 of Lecture Notes in Computer Science, page 181-195. Springer, (2000)