Author of the publication

Security Weaknesses in a Randomized Stream Cipher.

, , and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 234-241. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Counter with CBC-MAC (CCM)., , and . RFC, (September 2003)Practical cryptography., and . Wiley, (2003)Single Term Off-Line Coins.. EUROCRYPT, volume 765 of Lecture Notes in Computer Science, page 318-328. Springer, (1993)Comments on Twofish as an AES Candidate., , , , and . AES Candidate Conference, page 355-356. (2000)A Simple Algebraic Representation of Rijndael., , and . Selected Areas in Cryptography, volume 2259 of Lecture Notes in Computer Science, page 103-111. Springer, (2001)Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance., , , , and . CRYPTO (2), volume 14082 of Lecture Notes in Computer Science, page 514-546. Springer, (2023)Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator., , and . Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science, page 13-33. Springer, (1999)How to Forget a Secret., , , and . STACS, volume 1563 of Lecture Notes in Computer Science, page 500-509. Springer, (1999)Security Weaknesses in a Randomized Stream Cipher., , and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 234-241. Springer, (2000)A Second Pre-image Attack Against Elliptic Curve Only Hash (ECOH)., and . IACR Cryptology ePrint Archive, (2009)