Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reduced Complexity Attacks on the Alternating Step Generator., , and . Selected Areas in Cryptography, volume 4876 of Lecture Notes in Computer Science, page 1-16. Springer, (2007)Security of Jump Controlled Sequence Generators for Stream Ciphers., , , and . SETA, volume 4086 of Lecture Notes in Computer Science, page 141-152. Springer, (2006)Reduced access structures with four minimal qualified subsets on six participants., and . Adv. in Math. of Comm., 12 (1): 199-214 (2018)On Reconstruction of RC4 Keys from Internal States., and . MMICS, volume 5393 of Lecture Notes in Computer Science, page 179-189. Springer, (2008)Optimal linear secret sharing schemes for graph access structures on six participants., and . Theor. Comput. Sci., (2019)Ciphertext-only attack on d × d Hill in O(d13d)., and . Inf. Process. Lett., (2017)On Abelian Secret Sharing: duality and separation., and . IACR Cryptology ePrint Archive, (2019)Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers., , and . AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, page 236-245. Springer, (2008)New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba., , , , and . FSE, volume 5086 of Lecture Notes in Computer Science, page 470-488. Springer, (2008)A rigorous security analysis of a decentralized electronic voting protocol in the universal composability framework., and . J. Inf. Secur. Appl., (2018)