Author of the publication

Analysis of the Bit-Search Generator and Sequence Compression Techniques.

, , , , , and . FSE, volume 3557 of Lecture Notes in Computer Science, page 196-214. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Orderings on Artin-tits Groups.. Int. J. Algebra Comput., 18 (6): 1035-1066 (2008)Decimv2., , , , , , , , , and 3 other author(s). The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)Understanding Phase Shifting Equivalent Keys and Exhaustive Search., , and . IACR Cryptology ePrint Archive, (2008)Sosemanuk, a Fast Software-Oriented Stream Cipher., , , , , , , , , and 2 other author(s). The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)Fair E-Cash: Be Compact, Spend Faster., , , , , , , and . ISC, volume 5735 of Lecture Notes in Computer Science, page 294-309. Springer, (2009)Analysis of the Bit-Search Generator and Sequence Compression Techniques., , , , , and . FSE, volume 3557 of Lecture Notes in Computer Science, page 196-214. Springer, (2005)An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol., , and . IACR Cryptology ePrint Archive, (2005)Low-Cost Cryptography for Privacy in RFID Systems., , , and . CARDIS, volume 3928 of Lecture Notes in Computer Science, page 237-251. Springer, (2006)The GAIA sensor: an early DDoS detection tool., , and . SIGMETRICS Perform. Evaluation Rev., 34 (2): 7-8 (2006)Revisiting Correlation-Immunity in Filter Generators., and . Selected Areas in Cryptography, volume 4876 of Lecture Notes in Computer Science, page 378-395. Springer, (2007)