101 – 110 of 172
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2006
-
Mark
Three Ways to Mount Distinguishing Attacks on Irregularly Clocked Stream Ciphers
(
- Contribution to journal › Article
-
Mark
A stream cipher proposal: Grain-128
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cryptanalysis of pomaranch
(
- Contribution to journal › Article
- 2005
-
Mark
A new distinguisher for clock controlled stream ciphers
(
- Contribution to journal › Article
-
Mark
Fast computation of large distributions and its cryptographic applications
(
- Contribution to journal › Article
-
Mark
Some attacks on the Bit-search generator
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Snow 2.0 IP core for trusted hardware
2005) 2005 International Conference on Field Programmable Logic and Applications (FPL) 2005. p.281-286(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Balancing BlockRAM and distributed RAM
2005) Swedish System-on-Chip Conference (SSoCC'05)(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Authentication codes
2005)(
- Chapter in Book/Report/Conference proceeding › Book chapter
- 2004
-
Mark
An improved correlation attack on A5/1
2004) Selected Areas in Cryptography. 11th International Workshop, SAC 2004. Revised Selected Papers In Lecture Notes in Computer Science 3357. p.1-18(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding