From post

On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet.

, , и . SAC, том 11959 из Lecture Notes in Computer Science, стр. 365-392. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes., и . ACNS, том 9696 из Lecture Notes in Computer Science, стр. 467-484. Springer, (2016)Preimage Attacks on 3, 4, and 5-Pass HAVAL., и . ASIACRYPT, том 5350 из Lecture Notes in Computer Science, стр. 253-271. Springer, (2008)On the Use of GF-Inversion as a Cryptographic Primitive., и . Selected Areas in Cryptography, том 3006 из Lecture Notes in Computer Science, стр. 234-247. Springer, (2003)On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers., и . IWSEC, том 10418 из Lecture Notes in Computer Science, стр. 3-18. Springer, (2017)Forward-Secure Authenticated-Encryption in Multi-Receiver Setting., , , и . SECRYPT, стр. 141-148. INSTICC Press, (2006)Practical Password Recovery on an MD5 Challenge and Response., , и . IACR Cryptology ePrint Archive, (2007)Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta., и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (1): 141-149 (2013)A Cyclic Window Algorithm for Elliptic Curves over OEF., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (1): 121-128 (2003)Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl., , , , и . ICETE (Selected Papers), том 314 из Communications in Computer and Information Science, стр. 281-295. Springer, (2011)A Kilobit Special Number Field Sieve Factorization., , , , и . ASIACRYPT, том 4833 из Lecture Notes in Computer Science, стр. 1-12. Springer, (2007)