Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algebraic analysis of Trivium-like ciphers (Poster)., , , , and . AISC, volume 149 of CRPIT, page 77-81. Australian Computer Society, (2014)Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS., , , , , and . TrustCom/BigDataSE/ICESS, page 961-966. IEEE Computer Society, (2017)Correcting flaws in Mitchell's analysis of EPBC., , , , and . AISC, volume 161 of CRPIT, page 57-60. Australian Computer Society, (2015)Weak key-IV Pairs in the A5/1 Stream Cipher., , , , and . AISC, volume 149 of CRPIT, page 23-36. Australian Computer Society, (2014)Tweaking Generic OTR to Avoid Forgery Attacks., , , , and . ATIS, volume 651 of Communications in Computer and Information Science, page 41-53. (2016)Algebraic analysis of the SSS stream cipher., , , , and . SIN, page 199-204. ACM, (2011)State Convergence in the Initialisation of Stream Ciphers., , , , , and . ACISP, volume 6812 of Lecture Notes in Computer Science, page 75-88. Springer, (2011)Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers., , , , and . ACISP, volume 7372 of Lecture Notes in Computer Science, page 138-151. Springer, (2012)Slid Pairs in the Initialisation of the A5/1 Stream Cipher., , , , and . AISC, volume 138 of CRPIT, page 3-12. Australian Computer Society, (2013)Tweaking Generic OTR to Avoid Forgery Attacks., , , , and . IACR Cryptology ePrint Archive, (2018)