Author of the publication

Strengthening the Key Schedule of the AES.

, , , , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 226-240. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of Summation Generator.. AUSCRYPT, volume 718 of Lecture Notes in Computer Science, page 209-215. Springer, (1992)Inversion Attack and Branching., , and . Aust. Comput. J., 31 (2): 44-53 (1999)RAK factoring algorithm., , , , and . Australas. J Comb., (2005)Design and Cryptanalysis of Transform-Based Analog Speech Scamblers., , and . IEEE J. Sel. Areas Commun., 11 (5): 735-744 (1993)Universal Logic Sequences., and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 426-432. Springer, (1990)Shamir's Scheme Says It all., and . SEC, volume A-37 of IFIP Transactions, page 91-102. North-Holland, (1993)Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction., , , and . WISA, volume 2908 of Lecture Notes in Computer Science, page 244-256. Springer, (2003)Simple and Efficient Shuffling with Provable Correctness and ZK Privacy., , and . CRYPTO, volume 3621 of Lecture Notes in Computer Science, page 188-204. Springer, (2005)Non-interactive Auction Schemewith Strong Privacy., , , and . ICISC, volume 2587 of Lecture Notes in Computer Science, page 407-420. Springer, (2002)Key Schedules of Iterative Block Ciphers., , and . ACISP, volume 1438 of Lecture Notes in Computer Science, page 80-89. Springer, (1998)