From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Perspectives on Word Based Stream Ciphers., , и . Cryptographic Algorithms and their Uses, стр. 14-27. Queensland University of Technology, (2004)Analysis of a measure of correlation between two binary strings of different lengths., , и . Australas. J Comb., (2002)LILI Keystream Generator., , , и . Selected Areas in Cryptography, том 2012 из Lecture Notes in Computer Science, стр. 248-261. Springer, (2000)On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks., , , и . ACISP, том 4586 из Lecture Notes in Computer Science, стр. 11-28. Springer, (2007)Dragon: A Fast Word Based Stream Cipher., , , , , , , и . ICISC, том 3506 из Lecture Notes in Computer Science, стр. 33-50. Springer, (2004)Forgery attacks on ++AE authenticated encryption mode., , , , и . ACSW, стр. 33. ACM, (2016)Finding state collisions in the authenticated encryption stream cipher ACORN., , , , , и . ACSW, стр. 36. ACM, (2016)A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher., , , , и . ICISC, том 2971 из Lecture Notes in Computer Science, стр. 418-431. Springer, (2003)Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures., , , , , , , и . Cryptogr., 8 (1): 5 (марта 2024)Improved Cryptanalysis of MAG., и . ACISP, том 4058 из Lecture Notes in Computer Science, стр. 64-75. Springer, (2006)