Author of the publication

Conditional Correlation Attack on Nonlinear Filter Generators.

, , , and . ASIACRYPT, volume 1163 of Lecture Notes in Computer Science, page 360-367. Springer, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How to construct balanced Boolean functions with good global avalanche characteristics., , , and . ICISC, page 121-130. Korea Institute of Information Security and Cryptology (KIISC), (1998)New Block Cipher: ARIA., , , , , , , , , and 3 other author(s). ICISC, volume 2971 of Lecture Notes in Computer Science, page 432-445. Springer, (2003)A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures., , and . ICISC, volume 2015 of Lecture Notes in Computer Science, page 1-13. Springer, (2000)Elliptic Curves and Resilient Functions., and . ICISC, volume 2015 of Lecture Notes in Computer Science, page 64-72. Springer, (2000)On the Security of Reduced Versions of 3-Pass HAVAL., , , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 406-419. Springer, (2002)Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98., , and . FSE, volume 2365 of Lecture Notes in Computer Science, page 252-262. Springer, (2002)Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines., , , and . FSE, volume 3017 of Lecture Notes in Computer Science, page 193-209. Springer, (2004)Semi-bent Functions., , and . ASIACRYPT, volume 917 of Lecture Notes in Computer Science, page 107-118. Springer, (1994)On the Correlation Immune Functions and Their Nonlinearity., , , and . ASIACRYPT, volume 1163 of Lecture Notes in Computer Science, page 232-243. Springer, (1996)On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis., , , , and . ASIACRYPT, volume 2501 of Lecture Notes in Computer Science, page 176-191. Springer, (2002)