91 – 100 of 172
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2007
-
Mark
Cryptanalysis of Achterbahn-Version 2
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A framework for chosen IV statistical analysis of stream ciphers
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the problem of finding linear approximations and cryptanalysis of Pomaranch Version 2
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A key recovery attack on Edon80
(2007) ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security 4833. p.568-581
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A note on distinguishing attacks
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Cryptanalysis of Achterbahn-128/80
- Contribution to journal › Article
-
Mark
Grain - A stream cipher for constrained environments
- Contribution to journal › Article
-
Mark
A linear distinguishing attack on SCREAM
- Contribution to journal › Article
- 2006
-
Mark
Cryptanalysis of Achterbahn
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Three Ways to Mount Distinguishing Attacks on Irregularly Clocked Stream Ciphers
- Contribution to journal › Article
