Author of the publication

On Reconstruction of RC4 Keys from Internal States.

, and . MMICS, volume 5393 of Lecture Notes in Computer Science, page 179-189. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reduced access structures with four minimal qualified subsets on six participants., and . Adv. in Math. of Comm., 12 (1): 199-214 (2018)Optimal linear secret sharing schemes for graph access structures on six participants., and . Theor. Comput. Sci., (2019)On Reconstruction of RC4 Keys from Internal States., and . MMICS, volume 5393 of Lecture Notes in Computer Science, page 179-189. Springer, (2008)Reduced Complexity Attacks on the Alternating Step Generator., , and . Selected Areas in Cryptography, volume 4876 of Lecture Notes in Computer Science, page 1-16. Springer, (2007)Security of Jump Controlled Sequence Generators for Stream Ciphers., , , and . SETA, volume 4086 of Lecture Notes in Computer Science, page 141-152. Springer, (2006)On ideal homomorphic secret sharing schemes and their decomposition., , , , and . Des. Codes Cryptogr., 89 (9): 2079-2096 (2021)Security of Multi-Adjustable Join Schemes: Separations and Implications., and . IEEE Trans. Dependable Secur. Comput., 19 (4): 2535-2545 (2022)On Abelian Secret Sharing: duality and separation., and . IACR Cryptology ePrint Archive, (2019)A rigorous security analysis of a decentralized electronic voting protocol in the universal composability framework., and . J. Inf. Secur. Appl., (2018)New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba., , , , and . FSE, volume 5086 of Lecture Notes in Computer Science, page 470-488. Springer, (2008)