Author of the publication

Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN.

, , , , , and . IACR Cryptology ePrint Archive, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Five Sealed-bid Auction Models., , , and . ACSW, volume 21 of CRPIT, page 77-86. Australian Computer Society, (2003)Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN., , , , , and . IACR Cryptology ePrint Archive, (2015)Tweaking Generic OTR to Avoid Forgery Attacks., , , , and . IACR Cryptology ePrint Archive, (2018)Classification of Authentication Protocols: A Practical Approach., , and . ISW, volume 1975 of Lecture Notes in Computer Science, page 194-208. Springer, (2000)Linkability in Practical Electronic Cash Design., , , , and . ISW, volume 1975 of Lecture Notes in Computer Science, page 149-163. Springer, (2000)An Analysis of Integrity Services in Protocols., , and . INDOCRYPT, volume 2247 of Lecture Notes in Computer Science, page 175-187. Springer, (2001)An Efficient and Verifiable Solution to the Millionaire Problem., , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 51-66. Springer, (2004)A Secure Analog Speech Scrambler Using the Discrete Cosine Transform., , and . ASIACRYPT, volume 739 of Lecture Notes in Computer Science, page 299-311. Springer, (1991)An Improved Forward Integrity Protocol for Mobile Agents., , , and . WISA, volume 2908 of Lecture Notes in Computer Science, page 272-285. Springer, (2003)Authorization models for secure information sharing: a survey and research agenda., , and . ISeCure, 2 (2): 69-87 (2010)