Author of the publication

Efficient Implementations of Multivariate Quadratic Systems.

, , and . Selected Areas in Cryptography, volume 4356 of Lecture Notes in Computer Science, page 174-187. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Berbain, Côme
add a person with the name Berbain, Côme
 

Other publications of authors with the same name

QUAD: A multivariate stream cipher with provable security., , and . J. Symb. Comput., 44 (12): 1703-1723 (2009)Sosemanuk, a Fast Software-Oriented Stream Cipher., , , , , , , , , and 2 other author(s). The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)Cryptanalysis of Grain., , and . FSE, volume 4047 of Lecture Notes in Computer Science, page 15-29. Springer, (2006)Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions., , and . ASIACRYPT, volume 4284 of Lecture Notes in Computer Science, page 396-411. Springer, (2006)QUAD: A Practical Stream Cipher with Provable Security., , and . EUROCRYPT, volume 4004 of Lecture Notes in Computer Science, page 109-128. Springer, (2006)Efficient Implementations of Multivariate Quadratic Systems., , and . Selected Areas in Cryptography, volume 4356 of Lecture Notes in Computer Science, page 174-187. Springer, (2006)Compact FPGA implementations of QUAD., , , and . AsiaCCS, page 347-349. ACM, (2007)Understanding Phase Shifting Equivalent Keys and Exhaustive Search., , and . IACR Cryptology ePrint Archive, (2008)Decimv2., , , , , , , , , and 3 other author(s). The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)On the Security of IV Dependent Stream Ciphers., and . FSE, volume 4593 of Lecture Notes in Computer Science, page 254-273. Springer, (2007)