Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions., , and . IEEE Trans. Computers, 64 (6): 1647-1657 (2015)A Differential Fault Attack on Plantlet., , and . IEEE Trans. Computers, 66 (10): 1804-1808 (2017)Improved differential fault attack on MICKEY 2.0., , and . J. Cryptographic Engineering, 5 (1): 13-29 (2015)On Non-randomness of the Permutation After RC4 Key Scheduling., , and . AAECC, volume 4851 of Lecture Notes in Computer Science, page 100-109. Springer, (2007)A Chosen IV Related Key Attack on Grain-128a., , , and . ACISP, volume 7959 of Lecture Notes in Computer Science, page 13-26. Springer, (2013)A New Class of Weak Encryption Exponents in RSA., and . INDOCRYPT, volume 5365 of Lecture Notes in Computer Science, page 337-349. Springer, (2008)Analysis of RC4 and Proposal of Additional Layers for Better Security Margin., and . INDOCRYPT, volume 5365 of Lecture Notes in Computer Science, page 27-39. Springer, (2008)Multiples of Primitive Polynomials and Their Products over GF(2)., , and . Selected Areas in Cryptography, volume 2595 of Lecture Notes in Computer Science, page 214-231. Springer, (2002)Primitive Polynomials over GF(2) - A Cryptologic Approach., and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 23-34. Springer, (2001)Efficient quantum algorithm to construct arbitrary Dicke states, , , and . CoRR, (2012)