Author of the publication

Reduced Complexity Attacks on the Alternating Step Generator.

, , and . Selected Areas in Cryptography, volume 4876 of Lecture Notes in Computer Science, page 1-16. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security of Jump Controlled Sequence Generators for Stream Ciphers., , , and . SETA, volume 4086 of Lecture Notes in Computer Science, page 141-152. Springer, (2006)Reduced Complexity Attacks on the Alternating Step Generator., , and . Selected Areas in Cryptography, volume 4876 of Lecture Notes in Computer Science, page 1-16. Springer, (2007)Optimal linear secret sharing schemes for graph access structures on six participants., and . Theor. Comput. Sci., (2019)Reduced access structures with four minimal qualified subsets on six participants., and . Adv. in Math. of Comm., 12 (1): 199-214 (2018)On Reconstruction of RC4 Keys from Internal States., and . MMICS, volume 5393 of Lecture Notes in Computer Science, page 179-189. Springer, (2008)Partial Secret Sharing Schemes., and . IACR Cryptology ePrint Archive, (2020)Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT., , , and . Wirel. Pers. Commun., 95 (4): 5057-5080 (2017)Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers., , and . IACR Cryptology ePrint Archive, (2006)New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers., and . INDOCRYPT, volume 5365 of Lecture Notes in Computer Science, page 15-26. Springer, (2008)Improved Linear Differential Attacks on CubeHash., , , and . AFRICACRYPT, volume 6055 of Lecture Notes in Computer Science, page 407-418. Springer, (2010)