1 – 9 of 9
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2007
-
Mark
Two General Attacks on Pomaranch-like Keystream Generators
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A framework for chosen IV statistical analysis of stream ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Some Results on Distinguishing Attacks on Stream Ciphers
2007)(
- Thesis › Doctoral thesis (monograph)
-
Mark
A note on distinguishing attacks
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2006
-
Mark
Three Ways to Mount Distinguishing Attacks on Irregularly Clocked Stream Ciphers
(
- Contribution to journal › Article
- 2005
-
Mark
A new distinguisher for clock controlled stream ciphers
(
- Contribution to journal › Article
-
Mark
Attack the dragon
(
- Contribution to journal › Article
- 2004
-
Mark
Correlation attacks using a new class of weak feedback polynomials
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
A new simple technique to attack filter generators and related ciphers
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding