Author of the publication

Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines.

, , , and . FSE, volume 3017 of Lecture Notes in Computer Science, page 193-209. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures., , and . ICISC, volume 2015 of Lecture Notes in Computer Science, page 1-13. Springer, (2000)Elliptic Curves and Resilient Functions., and . ICISC, volume 2015 of Lecture Notes in Computer Science, page 64-72. Springer, (2000)On the Security of Reduced Versions of 3-Pass HAVAL., , , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 406-419. Springer, (2002)Global Avalanche Characteristics and Nonlinearity of Balanced Boolean Functions., , , and . Inf. Process. Lett., 65 (3): 139-144 (1998)Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98., , and . FSE, volume 2365 of Lecture Notes in Computer Science, page 252-262. Springer, (2002)Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines., , , and . FSE, volume 3017 of Lecture Notes in Computer Science, page 193-209. Springer, (2004)How to construct balanced Boolean functions with good global avalanche characteristics., , , and . ICISC, page 121-130. Korea Institute of Information Security and Cryptology (KIISC), (1998)Analysis of Layered ROLLO-I., , , , , and . IACR Cryptol. ePrint Arch., (2024)New Block Cipher: ARIA., , , , , , , , , and 3 other author(s). ICISC, volume 2971 of Lecture Notes in Computer Science, page 432-445. Springer, (2003)A note on digital signature scheme using a self-pairing map., and . Appl. Math. Comput., 169 (1): 472-475 (2005)