Author of the publication

Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material).

, , , and . IACR Cryptology ePrint Archive, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential Random Fault Attacks on Certain CAESAR Stream Ciphers., , , and . ICISC, volume 11975 of Lecture Notes in Computer Science, page 297-315. Springer, (2019)Bias in the nonlinear filter generator output sequence., , and . IACR Cryptology ePrint Archive, (2010)State convergence in the initialisation of the Sfinks stream cipher., , , , and . AISC, volume 125 of CRPIT, page 27-32. Australian Computer Society, (2012)Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output., , , and . ATIS, volume 1338 of Communications in Computer and Information Science, page 42-60. Springer, (2020)Fault attacks on Tiaoxin-346., , , , , and . ACSW, page 5:1-5:9. ACM, (2018)Towards a Secured and Safe Online Social Media Design Framework for People with Intellectual Disability., , and . ASSETS, page 91:1-91:4. ACM, (2021)A General Model for MAC Generation Using Direct Injection., , , , and . Inscrypt, volume 7763 of Lecture Notes in Computer Science, page 198-215. Springer, (2012)Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN., , , , , and . ATIS, volume 651 of Communications in Computer and Information Science, page 15-26. (2016)A Probabilistic Correlation Attack on the Shrinking Generator., , and . ACISP, volume 1438 of Lecture Notes in Computer Science, page 147-158. Springer, (1998)Fault analysis of AEZ., , , , and . Concurr. Comput. Pract. Exp., (2019)