Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bias in the nonlinear filter generator output sequence., , and . IACR Cryptology ePrint Archive, (2010)State convergence in the initialisation of the Sfinks stream cipher., , , , and . AISC, volume 125 of CRPIT, page 27-32. Australian Computer Society, (2012)Differential Random Fault Attacks on Certain CAESAR Stream Ciphers., , , and . ICISC, volume 11975 of Lecture Notes in Computer Science, page 297-315. Springer, (2019)Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output., , , and . ATIS, volume 1338 of Communications in Computer and Information Science, page 42-60. Springer, (2020)Towards a Secured and Safe Online Social Media Design Framework for People with Intellectual Disability., , and . ASSETS, page 91:1-91:4. ACM, (2021)Fault attacks on Tiaoxin-346., , , , , and . ACSW, page 5:1-5:9. ACM, (2018)Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN., , , , , and . ATIS, volume 651 of Communications in Computer and Information Science, page 15-26. (2016)A Probabilistic Correlation Attack on the Shrinking Generator., , and . ACISP, volume 1438 of Lecture Notes in Computer Science, page 147-158. Springer, (1998)A General Model for MAC Generation Using Direct Injection., , , , and . Inscrypt, volume 7763 of Lecture Notes in Computer Science, page 198-215. Springer, (2012)Anomaly Detection in the Key-Management Interoperability Protocol Using Metadata., , and . IEEE Open J. Comput. Soc., (2024)