Author of the publication

A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication.

, , , , and . IACR Cryptology ePrint Archive, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An approach for light-weight encryption employing dedicated coding.. GLOBECOM, page 874-880. IEEE, (2012)Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function., , , and . Inf. Process. Lett., 112 (21): 805-810 (2012)An Iterative Probabilistic Decoding Algorithm for Binary Linear Block Codes Beyond the Half Minimum Distance.. AAECC, volume 1255 of Lecture Notes in Computer Science, page 237-249. Springer, (1997)Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence., and . EUROCRYPT, volume 658 of Lecture Notes in Computer Science, page 124-137. Springer, (1992)A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach., and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 487-491. Springer, (1990)The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters., and . SCN, volume 3352 of Lecture Notes in Computer Science, page 310-323. Springer, (2004)A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys., , and . DRMTICS, volume 3919 of Lecture Notes in Computer Science, page 258-276. Springer, (2005)An improved key stream generator based on the programmable cellular automata.. ICICS, volume 1334 of Lecture Notes in Computer Science, page 181-191. Springer, (1997)A proposal of architectural elements for implementing secure software download service in software defined radio., , , and . PIMRC, page 442-446. IEEE, (2002)Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes., , and . IEICE Transactions, 90-A (6): 1248-1251 (2007)