Author of the publication

Cryptanalysis of the Stream Cipher ABC v2.

, and . Selected Areas in Cryptography, volume 4356 of Lecture Notes in Computer Science, page 56-66. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Misuse of RC4 in Microsoft Word and Excel.. IACR Cryptology ePrint Archive, (2005)Related-Cipher Attacks.. ICICS, volume 2513 of Lecture Notes in Computer Science, page 447-455. Springer, (2002)Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data., , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (4): 1667-1680 (2021)Worst-Case Analysis is Maximum-A-Posteriori Estimation., and . CoRR, (2023)Transtl: Spatial-Temporal Localization Transformer for Multi-Label Video Classification., , , , , and . ICASSP, page 1965-1969. IEEE, (2022)W-ART: Action Relation Transformer for Weakly-Supervised Temporal Action Localization., , , , , and . ICASSP, page 2195-2199. IEEE, (2022)An Intelligent Scheduling Access Privacy Protection Model of Electric Vehicle Based on 5G-V2X., , , , , and . Sci. Program., (2021)Resynchronization Attacks on WG and LEX., and . FSE, volume 4047 of Lecture Notes in Computer Science, page 422-432. Springer, (2006)Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy., and . EUROCRYPT, volume 4515 of Lecture Notes in Computer Science, page 276-290. Springer, (2007)Cryptanalysis of the Stream Cipher ABC v2., and . Selected Areas in Cryptography, volume 4356 of Lecture Notes in Computer Science, page 56-66. Springer, (2006)