Author of the publication

Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers.

, and . SPACE, volume 7644 of Lecture Notes in Computer Science, page 32-44. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing high-throughput hardware accelerator for stream cipher HC-128., , , and . ISCAS, page 1448-1451. IEEE, (2012)A Theoretical Analysis of the Structure of HC-128., , and . IWSEC, volume 7038 of Lecture Notes in Computer Science, page 161-177. Springer, (2011)A Combinatorial Analysis of HC-128., , and . IACR Cryptology ePrint Archive, (2010)Nearby-Friend Discovery Protocol for Multiple Users., , and . CSE (3), page 238-243. IEEE Computer Society, (2009)Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers., and . SPACE, volume 7644 of Lecture Notes in Computer Science, page 32-44. Springer, (2012)Some Observations on HC-128., , and . IACR Cryptology ePrint Archive, (2008)Some observations on HC-128., , , , and . Des. Codes Cryptogr., 59 (1-3): 231-245 (2011)Preserving Privacy in Location-Based Services Using Sudoku Structures., , and . ICISS, volume 8880 of Lecture Notes in Computer Science, page 448-463. Springer, (2014)