Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revisiting LFSRs for Cryptographic Applications., , , and . IEEE Trans. Inf. Theory, 57 (12): 8095-8113 (2011)New Classes of Cyclic Extended Goppa Codes.. IEEE Trans. Inf. Theory, 45 (4): 1264-1266 (1999)Goppa and related codes invariant under a prescribed permutation.. IEEE Trans. Inf. Theory, 46 (7): 2628-2633 (2000)Feedback with carry shift registers synthesis with the Euclidean algorithm., , and . IEEE Trans. Inf. Theory, 50 (5): 910-917 (2004)Codes over finite quotients of polynomial rings., and . Finite Fields Their Appl., (2014)Reducing Key Length of the McEliece Cryptosystem., , , and . AFRICACRYPT, volume 5580 of Lecture Notes in Computer Science, page 77-97. Springer, (2009)Two Algebraic Attacks Against the F-FCSRs Using the IV Mode., and . INDOCRYPT, volume 3797 of Lecture Notes in Computer Science, page 143-154. Springer, (2005)Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs., and . INDOCRYPT, volume 7668 of Lecture Notes in Computer Science, page 209-224. Springer, (2012)Security Analysis of a Cryptosystem Based on Subspace Subcodes., , , , , , , and . CBCrypto, volume 13150 of Lecture Notes in Computer Science, page 42-59. Springer, (2021)Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode., , and . INDOCRYPT, volume 5922 of Lecture Notes in Computer Science, page 119-135. Springer, (2009)