Author of the publication

Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers.

, , and . AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, page 236-245. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reduced Complexity Attacks on the Alternating Step Generator., , and . Selected Areas in Cryptography, volume 4876 of Lecture Notes in Computer Science, page 1-16. Springer, (2007)Security of Jump Controlled Sequence Generators for Stream Ciphers., , , and . SETA, volume 4086 of Lecture Notes in Computer Science, page 141-152. Springer, (2006)On Reconstruction of RC4 Keys from Internal States., and . MMICS, volume 5393 of Lecture Notes in Computer Science, page 179-189. Springer, (2008)Reduced access structures with four minimal qualified subsets on six participants., and . Adv. in Math. of Comm., 12 (1): 199-214 (2018)Optimal linear secret sharing schemes for graph access structures on six participants., and . Theor. Comput. Sci., (2019)New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba., , , , and . FSE, volume 5086 of Lecture Notes in Computer Science, page 470-488. Springer, (2008)Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers., , and . AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, page 236-245. Springer, (2008)A rigorous security analysis of a decentralized electronic voting protocol in the universal composability framework., and . J. Inf. Secur. Appl., (2018)On Abelian Secret Sharing: duality and separation., and . IACR Cryptology ePrint Archive, (2019)On ideal homomorphic secret sharing schemes and their decomposition., , , , and . Des. Codes Cryptogr., 89 (9): 2079-2096 (2021)