Gautham Sekar

From MaRDI portal
Person:3056876



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Meet-in-the-middle attacks on reduced-round GOST
Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography]
2021-09-20Paper
Challenging the increased resistance of regular hash functions against birthday attacks
Journal of Mathematical Cryptology
2013-01-17Paper
The stream cipher core of the 3GPP encryption standard 128-EEA3: timing attacks and countermeasures
Information Security and Cryptology
2013-01-07Paper
Meet-in-the-middle attacks on reduced-round XTEA
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
Cryptanalysis of the ESSENCE family of hash functions
Information Security and Cryptology
2010-11-23Paper
Improved Distinguishing Attacks on HC-256
Advances in Information and Computer Security
2009-10-28Paper
A New Approach to χ 2 Cryptanalysis of Block Ciphers
Lecture Notes in Computer Science
2009-09-29Paper
Distinguishing Attacks on the Stream Cipher Py
Fast Software Encryption
2009-04-02Paper
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
Research in Cryptology
2009-01-22Paper
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
Lecture Notes in Computer Science
2008-06-24Paper
Correlated Keystreams in Moustique
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
Improved Meet-in-the-Middle Attacks on Reduced-Round DES
Lecture Notes in Computer Science
2008-04-11Paper
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
Lecture Notes in Computer Science
2008-04-11Paper


Research outcomes over time


This page was built for person: Gautham Sekar