Author of the publication

Dragon: A Fast Word Based Stream Cipher.

, , , , , , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 33-50. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Deniable Authenticated Key Establishment for Internet Protocols., , , and . IACR Cryptology ePrint Archive, (2007)Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption., , , and . Mycrypt, volume 3715 of Lecture Notes in Computer Science, page 183-195. Springer, (2005)AKA Protocols for Mobile Communications., and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 400-411. Springer, (2000)Inefficiency of common-multiplicand multiplication and exponentiation algorithms by performing binary complements., , and . Appl. Math. Comput., 189 (1): 285-290 (2007)Secure Route Discovery Protocol for Ad Hoc Networks., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 90-A (2): 539-541 (2007)Universally composable anonymous Hash certification model., , and . Sci. China Ser. F Inf. Sci., 50 (3): 440-455 (2007)Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks., , , and . Ad Hoc Sens. Wirel. Networks, 10 (2-3): 235-251 (2010)An Attack on the Identity-Based Key Agreement Protocols in Multiple PKG Environment., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (3): 826-829 (2006)Efficient and Identity-based Signcryption with Provably-secure., , and . J. Digit. Content Technol. its Appl., 4 (7): 148-153 (2010)An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment., , , and . IEICE Trans. Inf. Syst., 93-D (3): 430-437 (2010)