Author of the publication

A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication.

, , , , and . IACR Cryptology ePrint Archive, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function., , , and . Inf. Process. Lett., 112 (21): 805-810 (2012)An approach for light-weight encryption employing dedicated coding.. GLOBECOM, page 874-880. IEEE, (2012)An Iterative Probabilistic Decoding Algorithm for Binary Linear Block Codes Beyond the Half Minimum Distance.. AAECC, volume 1255 of Lecture Notes in Computer Science, page 237-249. Springer, (1997)Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence., and . EUROCRYPT, volume 658 of Lecture Notes in Computer Science, page 124-137. Springer, (1992)A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach., and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 487-491. Springer, (1990)A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys., , and . DRMTICS, volume 3919 of Lecture Notes in Computer Science, page 258-276. Springer, (2005)The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters., and . SCN, volume 3352 of Lecture Notes in Computer Science, page 310-323. Springer, (2004)An improved key stream generator based on the programmable cellular automata.. ICICS, volume 1334 of Lecture Notes in Computer Science, page 181-191. Springer, (1997)Key management with minimized secret storage employing an erasure channel approach., , and . IEEE Communications Letters, 9 (8): 741-743 (2005)Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off., , and . IEEE Communications Letters, 11 (12): 988-990 (2007)