Author of the publication

Key Recovery and Forgery Attacks on the MacDES MAC Algorithm.

, , and . CRYPTO, volume 1880 of Lecture Notes in Computer Science, page 184-196. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sparse distance preservers and additive spanners., , and . SODA, page 414-423. ACM/SIAM, (2003)The minimum latency problem, , , , , and . Proceedings of the twenty-sixth annual ACM symposium on Theory of computing, page 163--171. (1994)Binary Non-tiles, and . CoRR, (2009)Ordering by weighted number of wins gives a good ranking for weighted tournaments., , and . ACM Trans. Algorithms, 6 (3): 55:1-55:13 (2010)A Combinatorial Problem Related to Multimodule Memory Organizations., and . J. ACM, 21 (3): 392-402 (1974)The Shrinking Generator., , and . CRYPTO, volume 773 of Lecture Notes in Computer Science, page 22-39. Springer, (1993)Attack on the Cryptographic Scheme NIKS-TAS.. CRYPTO, volume 839 of Lecture Notes in Computer Science, page 294-307. Springer, (1994)Constructive Bounds and Exact Expectations for the Random Assignment Problem., and . RANDOM, volume 1518 of Lecture Notes in Computer Science, page 319-330. Springer, (1998)Finding a Small Root of a Univariate Modular Equation.. EUROCRYPT, volume 1070 of Lecture Notes in Computer Science, page 155-165. Springer, (1996)Ordering by weighted number of wins gives a good ranking for weighted tournaments, , and . Electron. Colloquium Comput. Complex., (2005)