Leonie Simpson

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Key recovery attacks on grain-like keystream generators with key injection
 
2024-01-11Paper
Algebraic attacks on grain-like keystream generators
 
2022-12-07Paper
Differential random fault attacks on certain CAESAR stream ciphers
 
2020-07-08Paper
A fundamental flaw in the ++AE authenticated encryption mode
Journal of Mathematical Cryptology
2018-04-10Paper
Fault attacks on XEX mode with application to certain authenticated encryption modes
 
2017-08-25Paper
Fast correlation attacks on nonlinear filter generators
Information Processing Letters
2016-05-26Paper
Flaws in the initialisation process of stream ciphers
Computation, Cryptography, and Network Security
2016-03-04Paper
Weaknesses in the initialisation process of the common scrambling algorithm stream cipher
Sequences and Their Applications - SETA 2014
2015-09-09Paper
Indirect message injection for MAC generation
Journal of Mathematical Cryptology
2013-11-12Paper
State cycles, initialization and the Trivium stream cipher
Cryptography and Communications
2013-06-24Paper
A general model for MAC generation using direct injection
Information Security and Cryptology
2013-05-28Paper
Analysis of indirect message injection for MAC generation using stream ciphers
Information Security and Privacy
2012-09-07Paper
A framework for security analysis of key derivation functions
Information Security Practice and Experience
2012-06-29Paper
State convergence in the initialisation of stream ciphers
Information Security and Privacy
2011-07-07Paper
Linearity within the SMS4 block cipher
Information Security and Cryptology
2010-11-23Paper
Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher
Information Security and Privacy
2009-06-25Paper
scientific article; zbMATH DE number 5531983 (Why is no real title available?)
 
2009-03-24Paper
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks
Information Security and Privacy
2009-03-06Paper
Improved Cryptanalysis of MAG
Information Security and Privacy
2007-09-07Paper
scientific article; zbMATH DE number 1996484 (Why is no real title available?)
 
2003-10-22Paper
scientific article; zbMATH DE number 1500493 (Why is no real title available?)
 
2002-08-14Paper
scientific article; zbMATH DE number 1522640 (Why is no real title available?)
 
2002-06-10Paper
scientific article; zbMATH DE number 1744098 (Why is no real title available?)
 
2002-05-22Paper
scientific article; zbMATH DE number 1689010 (Why is no real title available?)
 
2002-01-09Paper
scientific article; zbMATH DE number 1588475 (Why is no real title available?)
 
2001-07-17Paper
scientific article; zbMATH DE number 1304126 (Why is no real title available?)
 
2000-02-02Paper
scientific article; zbMATH DE number 1189377 (Why is no real title available?)
 
1998-10-08Paper


Research outcomes over time


This page was built for person: Leonie Simpson