121 – 130 of 172
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2003
-
Mark
A note on the selfshrinking generator
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A linear distinguishing attack on Scream
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2002
-
Mark
Construction of cryptographically important Boolean functions
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Distinguishing attacks on SOBER-t16 and t32
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Theoretical analysis of a correlation attack based on convolutional codes
- Contribution to journal › Article
-
Mark
On the complexity of some cryptographic problems based on the general decoding problem
- Contribution to journal › Article
-
Mark
A fast correlation attack on LILI-128
- Contribution to journal › Article
-
Mark
New techniques for decoding codes in rank metric and its cryptographic applications
- Contribution to journal › Article
- 2001
-
Mark
Almost k-wise independent sample spaces and their cryptologic applications
- Contribution to journal › Article
-
Mark
Another attack on A5/1
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
