Martin Hell

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Plateaued rotation symmetric Boolean functions on odd number of variables2024-09-18Paper
Grain-128AEADv2: strengthening the initialization against key reconstruction2022-06-29Paper
An AEAD variant of the Grain stream cipher2019-10-14Paper
Improved Distinguishers on Stream Ciphers With Certain Weak Feedback Polynomials
IEEE Transactions on Information Theory
2017-06-08Paper
Espresso: a stream cipher for 5G wireless communication systems
Cryptography and Communications
2017-01-19Paper
Linear attacks on stream ciphers2014-08-07Paper
An efficient state recovery attack on the X-FCSR family of stream ciphers
Journal of Cryptology
2014-04-01Paper
A survey on fast correlation attacks
Cryptography and Communications
2013-06-24Paper
Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time
Journal of Cryptology
2012-09-21Paper
Analysis of Xorrotation with application to an HC-128 variant
Information Security and Privacy
2012-09-07Paper
Improved distinguishers for HC-128
Designs, Codes and Cryptography
2012-03-23Paper
An overview of distinguishing attacks on stream ciphers
Cryptography and Communications
2009-10-26Paper
An Efficient State Recovery Attack on X-FCSR-256
Fast Software Encryption
2009-08-11Paper
Breaking the F-FCSR-H Stream Cipher in Real Time
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Two New Attacks on the Self-Shrinking Generator
IEEE Transactions on Information Theory
2008-12-21Paper
Two General Attacks on Pomaranch-Like Keystream Generators
Fast Software Encryption
2008-09-16Paper
A Key Recovery Attack on Edon80
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Cryptanalysis of Achterbahn-Version 2
Selected Areas in Cryptography
2007-11-29Paper
On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2
Selected Areas in Cryptography
2007-11-29Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper


Research outcomes over time


This page was built for person: Martin Hell