Author of the publication

On the Security of Designing a Cellular Automata Based Stream Cipher.

, , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 406-413. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New algorithms for batch verification of standard ECDSA signatures., , , , , and . J. Cryptographic Engineering, 4 (4): 237-258 (2014)CASTREAM: A High-speed, Secure Stream Cipher Suitable for Both Hardware and Software., and . J. Cell. Autom., 9 (2-3): 153-166 (2014)An Analytical Framework for Characterizing Restricted Two Dimensional Cellular Automata Evolution., , , , and . J. Cell. Autom., 3 (4): 313-335 (2008)Theory of a Class of Complemented Group Cellular Automata and Its Application to Cryptography., and . J. Cell. Autom., 2 (3): 243-271 (2007)New Architectural Design of CA-Based Codec., and . IEEE Trans. Very Large Scale Integr. Syst., 18 (7): 1139-1144 (2010)Study of Five-Neighborhood Linear Hybrid Cellular Automata and Their Synthesis., and . ICMC, volume 655 of Communications in Computer and Information Science, page 68-83. (2017)On the Security of Designing a Cellular Automata Based Stream Cipher., , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 406-413. Springer, (2017)EscApe: Diagonal Fault Analysis of APE., , and . INDOCRYPT, volume 8885 of Lecture Notes in Computer Science, page 197-216. Springer, (2014)An Efficient Hardware Design for Combined AES and AEGIS., , and . EST, page 1-6. IEEE, (2019)Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry., , , and . AFRICACRYPT, volume 8469 of Lecture Notes in Computer Science, page 88-108. Springer, (2014)