Personensuche
X
?
Information Security and Privacy; Lecture Notes in Computer Science ,
1
Key Recovery Attacks on Grain-Like Keystream Generators wit..:
, In:
?
Information Security and Cryptology – ICISC 2021; Lecture Notes in Computer Science ,
3
Algebraic Attacks on Grain-Like Keystream Generators:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2019 ,
5
Differential Random Fault Attacks on Certain CAESAR Stream ..:
, In:
?
Applications and Techniques in Information Security; Communications in Computer and Information Science ,
6
Distinguishing Attacks on Linearly Filtered NFSRs with Deci..:
, In:
?
Proceedings of the Australasian Computer Science Week Multiconference ,
9
Fault attacks on Tiaoxin-346:
, In:
?
Proceedings of the Australasian Computer Science Week Multiconference ,
11
Finding state collisions in the authenticated encryption st..:
, In:
?
Proceedings of the Australasian Computer Science Week Multiconference ,
12