Author of the publication

Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN.

, , , , , and . ATIS, volume 651 of Communications in Computer and Information Science, page 15-26. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correcting flaws in Mitchell's analysis of EPBC., , , , and . AISC, volume 161 of CRPIT, page 57-60. Australian Computer Society, (2015)Weak key-IV Pairs in the A5/1 Stream Cipher., , , , and . AISC, volume 149 of CRPIT, page 23-36. Australian Computer Society, (2014)Algebraic analysis of the SSS stream cipher., , , , and . SIN, page 199-204. ACM, (2011)Tweaking Generic OTR to Avoid Forgery Attacks., , , , and . ATIS, volume 651 of Communications in Computer and Information Science, page 41-53. (2016)State Convergence in the Initialisation of Stream Ciphers., , , , , and . ACISP, volume 6812 of Lecture Notes in Computer Science, page 75-88. Springer, (2011)Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers., , , , and . ACISP, volume 7372 of Lecture Notes in Computer Science, page 138-151. Springer, (2012)Algebraic analysis of Trivium-like ciphers (Poster)., , , , and . AISC, volume 149 of CRPIT, page 77-81. Australian Computer Society, (2014)Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS., , , , , and . TrustCom/BigDataSE/ICESS, page 961-966. IEEE Computer Society, (2017)Tweaking Generic OTR to Avoid Forgery Attacks., , , , and . IACR Cryptology ePrint Archive, (2018)Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN., , , , , and . IACR Cryptology ePrint Archive, (2015)