Author of the publication

Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators.

, , , , , and . VIETCRYPT, volume 4341 of Lecture Notes in Computer Science, page 260-270. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A telco's perspectives: Open and flexible transport SDN., , and . APNOMS, page 121-126. IEEE, (2015)Fault Injection Attack on A5/3., , , and . ISPA, page 300-303. IEEE Computer Society, (2011)Update on SEED: SEED-192/256., , , , , , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 1-10. Springer, (2009)Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points., , , and . APNOMS, volume 5787 of Lecture Notes in Computer Science, page 385-394. Springer, (2009)HIGHT: A New Block Cipher Suitable for Low-Resource Device., , , , , , , , , and 3 other author(s). CHES, volume 4249 of Lecture Notes in Computer Science, page 46-59. Springer, (2006)Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks., , and . EURASIP J. Wireless Comm. and Networking, (2013)Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments., , , and . AINA Workshops, page 726-731. IEEE Computer Society, (2012)Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators., , , , , and . VIETCRYPT, volume 4341 of Lecture Notes in Computer Science, page 260-270. Springer, (2006)NAT Issues in the Remote Management of Home Network Devices., , , and . IEEE Netw., 22 (5): 48-55 (2008)Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128., , , , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 143-157. Springer, (2007)