21 – 30 of 33
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2015
-
Mark
Coded-BKW: Solving LWE Using Lattice Codes.
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2014
-
Mark
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
(
- Contribution to journal › Article
-
Mark
The Efficiency of Optimal Sampling in the Random S-box Model
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)
2014)(
- Book/Report › Report
- 2013
-
Mark
Cryptanalysis of Selected Stream Ciphers
(
- Thesis › Doctoral thesis (monograph)
- 2012
-
Mark
Improved distinguishers for HC-128
(
- Contribution to journal › Article
-
Mark
An Optimal Sampling Technique for Distinguishing Random S-boxes
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Analysis of Xorrotation With Application to an HC-128 Variant
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2010
-
Mark
Greedy distinguishers and nonrandomness detectors
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding