Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algebraic Attacks on Filter and Combiner Generators., , and . Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, volume 23 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2009)On a conjecture about a class of optimal ternary cyclic codes., , and . IWSDA, page 62-65. IEEE, (2015)The divisibility modulo 24 of Kloosterman sums on GF(2m), m odd., , and . J. Comb. Theory, Ser. A, 114 (2): 322-338 (2007)Divisibility properties of Kloosterman sums over finite fields of characteristic two., , and . ISIT, page 2608-2612. IEEE, (2008)On the Equation $x^2^l+1+x+a=0$ over $GF(2^k)$ (Extended Version), and . CoRR, (2008)On Cosets of Weight 4 of Binary BCH Codes with Minimum Distance 8 and Exponential Sums., , and . Probl. Inf. Transm., 41 (4): 331-348 (2005)On the Correlation Distribution for a Ternary Niho Decimation., , , and . CoRR, (2016)New commutative semifields defined by PN multinomials., and . IACR Cryptology ePrint Archive, (2009)A New Family of Gold-Like Sequences., , , and . SSC, volume 4893 of Lecture Notes in Computer Science, page 62-69. Springer, (2007)Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher., , and . The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)