Author of the publication

An Analysis of the Hermes8 Stream Ciphers.

, , , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 1-10. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The MICKEY Stream Ciphers., and . The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)Cryptanalysis of SOBER-t32., , , , and . FSE, volume 2887 of Lecture Notes in Computer Science, page 111-128. Springer, (2003)An Analysis of the Hermes8 Stream Ciphers., , , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 1-10. Springer, (2007)On MISTY1 Higher Order Differential Cryptanalysis., and . ICISC, volume 2015 of Lecture Notes in Computer Science, page 22-36. Springer, (2000)Design of Security Algorithms for Third Generation Mobile Telephony.. Inf. Secur. Tech. Rep., 5 (3): 66-73 (2000)The COS Stream Ciphers are Extremely Weak.. IACR Cryptology ePrint Archive, (2001)