Author of the publication

Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box.

, , , and . ICICS, volume 5308 of Lecture Notes in Computer Science, page 128-140. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Suzaki, Tomoyasu
add a person with the name Suzaki, Tomoyasu
 

Other publications of authors with the same name

Improving the Generalized Feistel., and . FSE, volume 6147 of Lecture Notes in Computer Science, page 19-39. Springer, (2010)Cryptanalysis of DES Implemented on Computers with Cache., , , , and . CHES, volume 2779 of Lecture Notes in Computer Science, page 62-76. Springer, (2003)$\textscTWINE$ : A Lightweight Block Cipher for Multiple Platforms., , , and . Selected Areas in Cryptography, volume 7707 of Lecture Notes in Computer Science, page 339-354. Springer, (2012)Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (4): 799-807 (2010)On Maximum Differential Probability of Generalized Feistel., , and . ACISP, volume 6812 of Lecture Notes in Computer Science, page 89-105. Springer, (2011)Impossible Differential Cryptanalysis of CLEFIA., , , , , and . FSE, volume 5086 of Lecture Notes in Computer Science, page 398-411. Springer, (2008)A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher., , , and . IEEE Trans. Inf. Theory, 53 (9): 3250-3255 (2007)Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box., , , and . ICICS, volume 5308 of Lecture Notes in Computer Science, page 128-140. Springer, (2008)