Author of the publication

Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.

, , , , , , and . J. Cryptol., 19 (4): 441-462 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provable Security of KASUMI and 3GPP Encryption Mode f8., , , and . ASIACRYPT, volume 2248 of Lecture Notes in Computer Science, page 255-271. Springer, (2001)CPA performance enhancement based on spectrogram., , , and . ICCST, page 195-200. IEEE, (2012)A Secure Handover Protocol Design in Wireless Networks with Formal Verification., , , and . WWIC, volume 4517 of Lecture Notes in Computer Science, page 67-78. Springer, (2007)Known-IV Attacks on Triple Modes of Operation of Block Ciphers., , , , , , and . ASIACRYPT, volume 2248 of Lecture Notes in Computer Science, page 208-221. Springer, (2001)Fingerprint Template Protection Using Fuzzy Vault., , , , , and . ICCSA (3), volume 4707 of Lecture Notes in Computer Science, page 1141-1151. Springer, (2007)Analysis of Radioactive Decay Based Entropy Generator in the IoT Environments., , , , and . WISA, volume 13720 of Lecture Notes in Computer Science, page 277-288. Springer, (2022)A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro., , , and . COMSWARE, IEEE, (2007)Practical Multi-party Versions of Private Set Intersection Protocols with Hardware Tokens., , , and . FGIT-FGCN/DCA, volume 350 of Communications in Computer and Information Science, page 72-79. Springer, (2012)A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring., , , , , and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 41-48. Springer, (2000)On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP., and . FGIT-SecTech/DRBC, volume 122 of Communications in Computer and Information Science, page 39-46. Springer, (2010)