101 – 170 of 170
- show: 100
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- « previous
- 1
- 2
- next »
- 2005
-
Mark
Fast computation of large distributions and its cryptographic applications
(
- Contribution to journal › Article
-
Mark
Some attacks on the Bit-search generator
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Snow 2.0 IP core for trusted hardware
2005) 2005 International Conference on Field Programmable Logic and Applications (FPL) 2005. p.281-286(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Authentication codes
2005)(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
Balancing BlockRAM and distributed RAM
2005) Swedish System-on-Chip Conference (SSoCC'05)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2004
-
Mark
An improved correlation attack on A5/1
2004) Selected Areas in Cryptography. 11th International Workshop, SAC 2004. Revised Selected Papers In Lecture Notes in Computer Science 3357. p.1-18(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A new simple technique to attack filter generators and related ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Correlation attacks using a new class of weak feedback polynomials
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A memory-efficient optimal APP symbol-elecoding algorithm for linear block codes
(
- Contribution to journal › Article
-
Mark
New constructions of resilient and correlation immune Boolean functions achieving the upper bound on nonlinearity
(
- Contribution to journal › Article
- 2003
-
Mark
Fast Software Encryption, FSE 2003
- Book/Report › Conference proceeding (editor)
-
Mark
Progress in Cryptology - INDOCRYPT 2003
- Book/Report › Conference proceeding (editor)
-
Mark
Analysis and design of modern stream ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A construction of resilient functions with high nonlinearity
(
- Contribution to journal › Article
-
Mark
A new version of the stream cipher SNOW
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Predicting the shrinking generator with fixed connections
2003) EUROCRYPT 2003: International Conference on the Theory and Applications of Cryptographic Techniques 2656. p.330-344(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A note on the selfshrinking generator
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Analysis and design of modern stream ciphers (invited paper)
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A linear distinguishing attack on Scream
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Another attack on A5/1
(
- Contribution to journal › Article
- 2002
-
Mark
Distinguishing attacks on SOBER-t16 and t32
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Construction of cryptographically important Boolean functions
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Theoretical analysis of a correlation attack based on convolutional codes
(
- Contribution to journal › Article
-
Mark
On the complexity of some cryptographic problems based on the general decoding problem
(
- Contribution to journal › Article
-
Mark
A fast correlation attack on LILI-128
(
- Contribution to journal › Article
-
Mark
New techniques for decoding codes in rank metric and its cryptographic applications
(
- Contribution to journal › Article
- 2001
-
Mark
Another attack on A5/1
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Almost k-wise independent sample spaces and their cryptologic applications
(
- Contribution to journal › Article
-
Mark
Results related to the upper bound on nonlinearity for resilient and correlation immune Boolean functions
(
- Contribution to conference › Paper, not in proceeding
-
Mark
Correlation attacks on stream ciphers over GF(2^n)
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2000
-
Mark
A simple algorithm for fast correlation attacks on stream ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Fast correlation attacks through reconstruction of linear polynomials
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A construction of resilient functions with high nonlinearity
(
- Contribution to conference › Paper, not in proceeding
-
Mark
A construction of resilient functions with high nonlinearity
2000) IEEE International Symposium on Information Theory (ISIT), 2000 In IEEE International Symposium on Information Theory p.184-184(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Theoretical analysis of a correlation attack based on convolutional codes
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Some results on correlations in the Bluetooth stream cipher
(
- Contribution to conference › Paper, not in proceeding
-
Mark
SNOW - A new stream cipher
2000) First open Nessie Workshop(
- Contribution to conference › Paper, not in proceeding
- 1999
-
Mark
Improved fast correlation attacks on stream ciphers via convolutional codes
1999) International Conference on the Theory and Application of Cryptographic Techniques EUROCRYPT ’99 1592. p.347-362(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Further results on the relation between nonlinearity and resiliency of Boolean functions
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Fast correlation attacks based on turbo code techniques
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Further results on asymmetric authentication schemes
(
- Contribution to journal › Article
-
Mark
Correlation attacks, convolutional codes, and iterative decoding
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1998
-
Mark
Reduced complexity correlation attacks on two clock-controlled generators
1998) International Conference on the Theory and Application of Cryptology and Information Security ASIACRYPT’98 1514. p.342-356(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A simple one sweep algorithm for optimal APP symbol decoding of linear block codes
(
- Contribution to journal › Article
-
Mark
On key and message equivocations in secrecy systems
(
- Contribution to journal › Article
-
Mark
A simple one sweep algorithm for optimal APP symbol decoding of linear block codes
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Correlation attacks on stream ciphers and related decoding problems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On some cryptographic problems based on the general decoding problem
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1997
-
Mark
Almost k-wise independent sample spaces and their cryptologic applications
1997) International Conference on the Theory and Application of Cryptographic Techniques - EUROCRYPT'97 1233. p.409-421(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Bucket hashing with a small key size'
1997) nternational Conference on the Theory and Application of Cryptographic Techniques EUROCRYPT ’97 1233. p.149-162(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Codes combining error detection and authentication
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Coding problems of cryptography or codesets vs. codewords
(
- Contribution to conference › Paper, not in proceeding
- 1996
-
Mark
Universal hash functions from exponential sums over finite fields and Galois rings
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the cardinality of systematic authentication codes via error-correcting codes
(
- Contribution to journal › Article
-
Mark
Relations between error-correcting codes, authentication
1996) Computer Security, Cryptology and Coding theory research program, Cambridge(
- Contribution to conference › Abstract
- 1995
-
Mark
On A2-codes including arbiter's attacks
1995) Workshop on the Theory and Application of Cryptographic Techniques EUROCRYPT'94 950. p.456-461(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Authentication codes protecting against collusion attacks
(
- Contribution to conference › Paper, not in proceeding
-
Mark
Authentication codes for non-trusting parties obtained from rank metric codes
(
- Contribution to journal › Article
-
Mark
Constructions of asymmetric authentication systems
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1994
-
Mark
Lower bounds on the probability of deception in authentication with arbitration
(
- Contribution to journal › Article
-
Mark
A shift register construction of unconditionally secure authentication codes
(
- Contribution to journal › Article
-
Mark
A2-codes and codes for the rank metric
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Contributions to unconditionally secure authentication
1994)(
- Thesis › Doctoral thesis (monograph)
-
Mark
Secrecy codes for source messages of finite length
(
- Contribution to conference › Paper, not in proceeding
- 1993
-
Mark
On the construction of perfect authentication codes that permit arbitration
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the relation between A-codes and codes correcting independent errors
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the construction of universal families of hash functions via geometric codes and concatenation
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Lower bounds on the probability of deception in authentication
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Relations between authentication codes and error-correcting codes
(
- Contribution to conference › Paper, not in proceeding
- 1991
-
Mark
A construction of authentication codes with total secrecy
(
- Contribution to conference › Paper, not in proceeding
- « previous
- 1
- 2
- next »