51 – 60 of 166
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2015
-
Mark
Coded-BKW: Solving LWE Using Lattice Codes.
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2014
-
Mark
An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers
(
- Contribution to journal › Article
-
Mark
Improved Algorithms for Finding Low-Weight Polynomial Multiples in GF(2)[x] and Some Cryptographic Applications
(
- Contribution to journal › Article
-
Mark
Solving LPN Using Covering Codes
2014) 20th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt) 8873. p.1-20(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2013
-
Mark
Improved Key Recovery Attack on the BEAN Stream Cipher
2013) In IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E96A(6). p.1437-1444(
- Contribution to journal › Article
-
Mark
A new algorithm for finding low-weight polynomial multiples and its application to TCHo
2013) International Workshop on Coding and Cryptography, WCC 2013(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2012
-
Mark
A Survey on Fast Correlation Attacks
(
- Contribution to journal › Scientific review
-
Mark
Improved distinguishers for HC-128
(
- Contribution to journal › Article
-
Mark
Some results on fast algebraic attacks and higher-order non-linearities
(
- Contribution to journal › Article
-
Mark
On Hardware-Oriented Message Authentication
(
- Contribution to journal › Article