Author of the publication

Security of Jump Controlled Sequence Generators for Stream Ciphers.

, , , and . SETA, volume 4086 of Lecture Notes in Computer Science, page 141-152. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Correlation Distribution for a Ternary Niho Decimation., , , and . CoRR, (2016)A characterization of some \3v2 + v3, 3v1 + v2; 3, 3\-minihypers and some 15, 4, 9; 3-codes with B2 = 0, and . Journal of Statistical Planning and Inference, 56 (1): 129--146 (Dec 1, 1996)On a conjecture about a class of optimal ternary cyclic codes., , and . IWSDA, page 62-65. IEEE, (2015)Divisibility properties of Kloosterman sums over finite fields of characteristic two., , and . ISIT, page 2608-2612. IEEE, (2008)On Isotopisms of Commutative presemifields and CCZ-Equivalence of Functions., and . Int. J. Found. Comput. Sci., 22 (6): 1243-1258 (2011)Attacking the Filter Generator over GF (2 m )., and . WAIFI, volume 4547 of Lecture Notes in Computer Science, page 264-275. Springer, (2007)On Linear Goethals Codes and Kloosterman Sums., and . Des. Codes Cryptogr., 17 (1-3): 269-288 (1999)A New Family of Gold-Like Sequences., , , and . SSC, volume 4893 of Lecture Notes in Computer Science, page 62-69. Springer, (2007)Triple-error-correcting BCH-like codes., and . ISIT, page 1723-1725. IEEE, (2009)A new family of APN quadrinomials., , and . IACR Cryptology ePrint Archive, (2019)