Author of the publication

Analysis of Trivium Using Compressed Right Hand Side Equations.

, and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 18-32. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algebraic Analysis of the Simon Block Cipher Family.. LATINCRYPT, volume 9230 of Lecture Notes in Computer Science, page 157-169. Springer, (2015)Solving Compressed Right Hand Side Equation Systems with Linear Absorption., and . SETA, volume 7280 of Lecture Notes in Computer Science, page 291-302. Springer, (2012)Analysis of Multivariate Encryption Schemes: Application to Dob., , and . Public Key Cryptography (1), volume 12710 of Lecture Notes in Computer Science, page 155-183. Springer, (2021)An Analysis of the Hermes8 Stream Ciphers., , , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 1-10. Springer, (2007)Security notions for cloud storage and deduplication., , , , and . IACR Cryptology ePrint Archive, (2017)More Dual Rijndaels.. AES Conference, volume 3373 of Lecture Notes in Computer Science, page 142-147. Springer, (2004)Security Notions for Cloud Storage and Deduplication., , , , and . ProvSec, volume 11192 of Lecture Notes in Computer Science, page 347-365. Springer, (2018)Influence of addition modulo 2 n on algebraic attacks., , and . Cryptogr. Commun., 8 (2): 277-289 (2016)Analysis of Trivium Using Compressed Right Hand Side Equations., and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 18-32. Springer, (2011)Solving Equation Systems by Agreeing and Learning., and . WAIFI, volume 6087 of Lecture Notes in Computer Science, page 151-165. Springer, (2010)