Author of the publication

Design Space Exploration of Galois and Fibonacci Configuration based on Espresso Stream Cipher.

, , , , and . IACR Cryptol. ePrint Arch., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Classes of Ternary Bent Functions from the Coulter-Matthews Bent Functions., , and . CoRR, (2017)A New Factoring Attack on Multi-Prime RSA with Small Prime Difference., and . IACR Cryptology ePrint Archive, (2015)On the Provable Security of the Tweakable Even-Mansour Cipher Against Multi-Key and Related-Key Attacks., and . IACR Cryptology ePrint Archive, (2016)New Classes of Ternary Bent Functions From the Coulter-Matthews Bent Functions., , and . IEEE Trans. Inf. Theory, 64 (6): 4653-4663 (2018)Comments on Ä New Method to Compute the 2-Adic Complexity of Binary Sequences".. IEEE Trans. Inf. Theory, 60 (9): 5803-5804 (2014)New Constructions of Codebooks Nearly Meeting the Welch Bound With Equality., and . IEEE Trans. Inf. Theory, 60 (2): 1348-1355 (2014)On the 2-Adic Complexity and the k-Error 2 -Adic Complexity of Periodic Binary Sequences., and . IEEE Trans. Inf. Theory, 54 (2): 874-883 (2008)Close to Optimally Secure Variants of GCM., , and . Secur. Commun. Networks, (2018)Improved Factoring Attacks on Multi-prime RSA with Small Prime Difference., , and . ACISP (1), volume 10342 of Lecture Notes in Computer Science, page 324-342. Springer, (2017)Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains., , , and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 248-262. Springer, (2008)