51 – 60 of 78
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 2011
-
Mark
Evaluation of Some Algorithms for Hardware-Oriented Message Authentication
(2011)
- Book/Report › Report
-
Mark
Searching for new convolutional codes using the cell broadband engine architecture
- Contribution to journal › Article
-
Mark
Linear Attacks on Stream Ciphers
(2011) p.55-85
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
A New Version of Grain-128 with Authentication
(2011) Symmetric Key Encryption Workshop 2011
- Contribution to conference › Paper, not in proceeding
- 2010
-
Mark
Laboratory instructions as a cause of student dissonance
(2010) LTHs 6:e Pedagogiska Inspirationskonferens, 2010
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Security Evaluation of Stream Cipher Enocoro-128v2
(2010)
- Book/Report › Report
-
Mark
Using Coding Techniques to Analyze Weak Feedback Polynomials
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2009
-
Mark
Improving the rainbow attack by reusing colours
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An overview of distinguishing attacks on stream ciphers
- Contribution to journal › Article
-
Mark
Another look at weak feedback polynomials in the nonlinear combiner
- Contribution to conference › Paper, not in proceeding
