Author of the publication

Security of Jump Controlled Sequence Generators for Stream Ciphers.

, , , and . SETA, volume 4086 of Lecture Notes in Computer Science, page 141-152. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Significance of the Directed Acyclic Word Graph in Cryptology., and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 318-326. Springer, (1990)The Shortest Feedback Shift Register That Can Generate A Given Sequence., and . CRYPTO, volume 435 of Lecture Notes in Computer Science, page 90-99. Springer, (1989)The Maximum Order Complexity of Sequence Ensembles.. EUROCRYPT, volume 547 of Lecture Notes in Computer Science, page 153-159. Springer, (1991)Protection Against Active Eavesdropping.. EUROCRYPT, page 4-6. (1986)A Binary Sequence Generator Based on Ziv-Lempel Source Coding., and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 156-164. Springer, (1990)On the Construction of Run Permuted Sequences.. EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 196-203. Springer, (1990)Security of Jump Controlled Sequence Generators for Stream Ciphers., , , and . SETA, volume 4086 of Lecture Notes in Computer Science, page 141-152. Springer, (2006)State space cryptanalysis of the MICKEY cipher., , , and . ITA, page 1-10. IEEE, (2013)Modes of Blockcipher Algorithms and their Protection Against Active Eavesdropping., and . EUROCRYPT, volume 304 of Lecture Notes in Computer Science, page 281-286. Springer, (1987)