Author of the publication

Cryptanalysis of MV3 Stream Cipher.

, , and . CANS, volume 5339 of Lecture Notes in Computer Science, page 240-251. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of WG-8 and WG-16 stream ciphers., , , and . Cryptogr. Commun., 11 (2): 351-362 (2019)Cryptanalysis of RC4(n, m) stream cipher., , , and . SIN, page 165-172. ACM, (2013)Breaking NLM-MAC Generator., , and . IACR Cryptology ePrint Archive, (2013)RC4-BHF: An Improved RC4-Based Hash Function., , , and . CIT, page 322-326. IEEE Computer Society, (2012)Security Evaluation of Rakaposhi Stream Cipher., , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 361-371. Springer, (2013)Cryptanalysis of RC4-Based Hash Function., , and . AISC, volume 125 of CRPIT, page 33-38. Australian Computer Society, (2012)A Distinguish attack on COSvd Ciphers., and . IACR Cryptology ePrint Archive, (2005)A differential fault attack on the WG family of stream ciphers., , , and . J. Cryptogr. Eng., 10 (2): 189-195 (2020)Security Evaluation of Rakaposhi Stream Cipher., , , and . IACR Cryptology ePrint Archive, (2012)Cryptanalysis of MV3 Stream Cipher., , and . CANS, volume 5339 of Lecture Notes in Computer Science, page 240-251. Springer, (2008)