71 – 80 of 168
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2011
-
Mark
On equivalence classes of Boolean functions
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
An improvement to Stern's algorithm
2011)(
- Book/Report › Report
-
Mark
On Hardware-Oriented Message Authentication with Applications Towards RFID
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Evaluation of Some Algorithms for Hardware-Oriented Message Authentication
2011)(
- Book/Report › Report
-
Mark
A note on fast algebraic attacks and higher order nonlinearities
(
- Chapter in Book/Report/Conference proceeding › Book chapter
-
Mark
A New Version of Grain-128 with Authentication
2011) Symmetric Key Encryption Workshop 2011(
- Contribution to conference › Paper, not in proceeding
- 2010
-
Mark
Security Evaluation of Stream Cipher Enocoro-128v2
2010)(
- Book/Report › Report
- 2009
-
Mark
Improving the rainbow attack by reusing colours
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
An overview of distinguishing attacks on stream ciphers
(
- Contribution to journal › Article
-
Mark
An efficient state recovery attack on X-FCSR-256
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding