Author of the publication

Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions.

, , and . ASIACRYPT, volume 4284 of Lecture Notes in Computer Science, page 396-411. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Berbain, Côme
add a person with the name Berbain, Côme
 

Other publications of authors with the same name

QUAD: A multivariate stream cipher with provable security., , and . J. Symb. Comput., 44 (12): 1703-1723 (2009)Cryptanalysis of Grain., , and . FSE, volume 4047 of Lecture Notes in Computer Science, page 15-29. Springer, (2006)Sosemanuk, a Fast Software-Oriented Stream Cipher., , , , , , , , , and 2 other author(s). The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)Efficient Implementations of Multivariate Quadratic Systems., , and . Selected Areas in Cryptography, volume 4356 of Lecture Notes in Computer Science, page 174-187. Springer, (2006)Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions., , and . ASIACRYPT, volume 4284 of Lecture Notes in Computer Science, page 396-411. Springer, (2006)QUAD: A Practical Stream Cipher with Provable Security., , and . EUROCRYPT, volume 4004 of Lecture Notes in Computer Science, page 109-128. Springer, (2006)Compact FPGA implementations of QUAD., , , and . AsiaCCS, page 347-349. ACM, (2007)On the Security of IV Dependent Stream Ciphers., and . FSE, volume 4593 of Lecture Notes in Computer Science, page 254-273. Springer, (2007)Understanding Phase Shifting Equivalent Keys and Exhaustive Search., , and . IACR Cryptology ePrint Archive, (2008)Decimv2., , , , , , , , , and 3 other author(s). The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)