1 – 2 of 2
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2007
-
Mark
Two General Attacks on Pomaranch-like Keystream Generators
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2006
-
Mark
Three Ways to Mount Distinguishing Attacks on Irregularly Clocked Stream Ciphers
(
- Contribution to journal › Article