Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A light-weight authentication scheme for wireless sensor networks., , and . Ad Hoc Networks, 9 (5): 727-735 (2011)A New Simple Attack on a Wide Class of Cryptographic Sequence Generators., , and . SOCO-CISIS-ICEUTE, volume 649 of Advances in Intelligent Systems and Computing, page 533-543. Springer, (2017)Balancedness in Binary Sequences with Cryptographic Applications., and . PPAM, volume 4967 of Lecture Notes in Computer Science, page 499-508. Springer, (2007)Correction to "Generalized Self-Shrinking Generator". CoRR, (2010)Characterization of the Least Periods of the Generalized Self-Shrinking Sequences.. CoRR, (2013)Using Linear Difference Equations to Model Nonlinear Cryptographic Sequences, , and . CoRR, (2010)Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application., , and . ICCS (1), volume 5544 of Lecture Notes in Computer Science, page 621-630. Springer, (2009)Linearization of Cryptographic Sequences., and . CISIS-ICEUTE, volume 951 of Advances in Intelligent Systems and Computing, page 165-174. Springer, (2019)Improvement of the Edit Distance Attack to Clock-Controlled LFSR-Based Stream Ciphers., and . EUROCAST, volume 3643 of Lecture Notes in Computer Science, page 355-364. Springer, (2005)On the Linear Complexity of Nonlinear Filtered PN-sequences., and . ASIACRYPT, volume 917 of Lecture Notes in Computer Science, page 80-90. Springer, (1994)