Author of the publication

Elliptic Curves and Resilient Functions.

, and . ICISC, volume 2015 of Lecture Notes in Computer Science, page 64-72. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Block Cipher: ARIA., , , , , , , , , and 3 other author(s). ICISC, volume 2971 of Lecture Notes in Computer Science, page 432-445. Springer, (2003)How to construct balanced Boolean functions with good global avalanche characteristics., , , and . ICISC, page 121-130. Korea Institute of Information Security and Cryptology (KIISC), (1998)A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures., , and . ICISC, volume 2015 of Lecture Notes in Computer Science, page 1-13. Springer, (2000)Elliptic Curves and Resilient Functions., and . ICISC, volume 2015 of Lecture Notes in Computer Science, page 64-72. Springer, (2000)On the Security of Reduced Versions of 3-Pass HAVAL., , , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 406-419. Springer, (2002)Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98., , and . FSE, volume 2365 of Lecture Notes in Computer Science, page 252-262. Springer, (2002)Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines., , , and . FSE, volume 3017 of Lecture Notes in Computer Science, page 193-209. Springer, (2004)Conditional Correlation Attack on Nonlinear Filter Generators., , , and . ASIACRYPT, volume 1163 of Lecture Notes in Computer Science, page 360-367. Springer, (1996)S-boxes with Controllable Nonlinearity., , and . EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, page 286-294. Springer, (1999)New Public Key Cryptosystem Using Finite Non Abelian Groups., , , , and . CRYPTO, volume 2139 of Lecture Notes in Computer Science, page 470-485. Springer, (2001)