Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fast correlation attack on LILI-128., and . Inf. Process. Lett., 81 (3): 127-132 (2002)Theoretical analysis of a correlation attack based on convolutional codes., and . IEEE Trans. Information Theory, 48 (8): 2173-2181 (2002)On the cardinality of systematic authentication codes via error-correcting codes., , and . IEEE Trans. Information Theory, 42 (2): 566-578 (1996)Snow 2.0 IP Core for Trusted Hardware., , and . FPL, page 281-286. IEEE, (2005)Development of an Autonomous Forest Machine for Path Tracking., , and . FSR, volume 25 of Springer Tracts in Advanced Robotics, page 603-614. Springer, (2005)Some cryptanalytic and coding-theoretic applications of a soft stern algorithm., , , and . Adv. in Math. of Comm., 13 (4): 559-578 (2019)Two New Attacks on the Self-Shrinking Generator., and . IEEE Trans. Information Theory, 52 (8): 3837-3843 (2006)The Grain Family of Stream Ciphers., , , and . The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2., and . Selected Areas in Cryptography, volume 4356 of Lecture Notes in Computer Science, page 220-233. Springer, (2006)Bucket Hashing with a Small Key Size.. EUROCRYPT, volume 1233 of Lecture Notes in Computer Science, page 149-162. Springer, (1997)