Author of the publication

Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher.

, and . Cryptologia, 33 (3): 246-270 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High speed implementation of symmetric block cipher on GPU., , , and . ISPACS, page 102-107. IEEE, (2014)Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents., , , and . Wireless Personal Communications, 56 (1): 73-83 (2011)Cryptanalysis of a certificateless identification scheme., , , and . Secur. Commun. Networks, 8 (2): 122-125 (2015)SearchaStore: fast and secure searchable cloud services., , , and . Clust. Comput., 21 (2): 1189-1202 (2018)A Cryptanalytic View of the NSA's Skipjack Block Cipher Design., and . ISA, volume 5576 of Lecture Notes in Computer Science, page 368-381. Springer, (2009)On the Security of a Hybrid SVD-DCT Watermarking Method Based on LPSNR., , and . PSIVT (1), volume 7087 of Lecture Notes in Computer Science, page 257-266. Springer, (2011)Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords., and . ACNS, volume 3989 of Lecture Notes in Computer Science, page 226-238. (2006)Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis., and . CARDIS, volume 3928 of Lecture Notes in Computer Science, page 135-150. Springer, (2006)Energy-Efficient Cryptographic Engineering Paradigm., and . iNetSeC, volume 7039 of Lecture Notes in Computer Science, page 78-88. Springer, (2011)On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences., , and . WISA, volume 4867 of Lecture Notes in Computer Science, page 245-265. Springer, (2007)