Author of the publication

Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher.

, , and . ACISP, volume 5594 of Lecture Notes in Computer Science, page 108-121. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential Random Fault Attacks on Certain CAESAR Stream Ciphers., , , and . ICISC, volume 11975 of Lecture Notes in Computer Science, page 297-315. Springer, (2019)State convergence in the initialisation of the Sfinks stream cipher., , , , and . AISC, volume 125 of CRPIT, page 27-32. Australian Computer Society, (2012)Bias in the nonlinear filter generator output sequence., , and . IACR Cryptology ePrint Archive, (2010)Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output., , , and . ATIS, volume 1338 of Communications in Computer and Information Science, page 42-60. Springer, (2020)Towards a Secured and Safe Online Social Media Design Framework for People with Intellectual Disability., , and . ASSETS, page 91:1-91:4. ACM, (2021)Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN., , , , , and . ATIS, volume 651 of Communications in Computer and Information Science, page 15-26. (2016)Fault attacks on Tiaoxin-346., , , , , and . ACSW, page 5:1-5:9. ACM, (2018)A General Model for MAC Generation Using Direct Injection., , , , and . Inscrypt, volume 7763 of Lecture Notes in Computer Science, page 198-215. Springer, (2012)A Probabilistic Correlation Attack on the Shrinking Generator., , and . ACISP, volume 1438 of Lecture Notes in Computer Science, page 147-158. Springer, (1998)Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material)., , , and . IACR Cryptology ePrint Archive, (2020)