Author of the publication

Dragon: A Fast Word Based Stream Cipher.

, , , , , , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 33-50. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perspectives on Word Based Stream Ciphers., , and . Cryptographic Algorithms and their Uses, page 14-27. Queensland University of Technology, (2004)Forgery attacks on ++AE authenticated encryption mode., , , , and . ACSW, page 33. ACM, (2016)Finding state collisions in the authenticated encryption stream cipher ACORN., , , , , and . ACSW, page 36. ACM, (2016)Dragon: A Fast Word Based Stream Cipher., , , , , , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 33-50. Springer, (2004)Analysis of a measure of correlation between two binary strings of different lengths., , and . Australas. J Comb., (2002)LILI Keystream Generator., , , and . Selected Areas in Cryptography, volume 2012 of Lecture Notes in Computer Science, page 248-261. Springer, (2000)On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks., , , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 11-28. Springer, (2007)A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher., , , , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 418-431. Springer, (2003)Improved Cryptanalysis of MAG., and . ACISP, volume 4058 of Lecture Notes in Computer Science, page 64-75. Springer, (2006)