From post

Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes.

, и . IEEE Trans. Computers, 65 (2): 640-653 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

One Word/Cycle HC-128 Accelerator via State-Splitting Optimization., , , и . INDOCRYPT, том 8885 из Lecture Notes in Computer Science, стр. 283-303. Springer, (2014)Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck., и . ACISP, том 5107 из Lecture Notes in Computer Science, стр. 306-320. Springer, (2008)On biases of permutation and keystream bytes of RC4 towards the secret key., и . Cryptogr. Commun., 1 (2): 225-268 (2009)Keyless Steganography in Spatial Domain Using Energetic Pixels., , , и . ICISS, том 7671 из Lecture Notes in Computer Science, стр. 134-148. Springer, (2012)Preserving Privacy in Location-Based Services Using Sudoku Structures., , и . ICISS, том 8880 из Lecture Notes in Computer Science, стр. 448-463. Springer, (2014)Towards a More Democratic Mining in Bitcoins., , и . ICISS, том 8880 из Lecture Notes in Computer Science, стр. 185-203. Springer, (2014)On Necessary and Sufficient Number of Cops in the Game of Cops and Robber in Multidimensional Grids, , и . CoRR, (2009)On effective sharing of user generated content., и . APCHI, стр. 114-118. ACM, (2013)Locating secret messages in images., и . KDD, стр. 545-550. ACM, (2004)Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE., , и . ACISP (1), том 10342 из Lecture Notes in Computer Science, стр. 343-362. Springer, (2017)