| Publication | Date of Publication | Type |
|---|
| A faster cryptanalysis of the self-shrinking generator | 2024-07-11 | Paper |
A protocol for provably secure authentication of a tiny entity to a high performance computing one Mathematical Problems in Engineering | 2018-10-12 | Paper |
On message protection in cryptosystems modelled as the generalized wire-tap channel II Lecture Notes in Computer Science | 2018-04-26 | Paper |
| On certain approaches for analysis and design of cryptographic techniques | 2015-06-26 | Paper |
Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 Periodica Mathematica Hungarica | 2014-02-17 | Paper |
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function Information Processing Letters | 2012-10-23 | Paper |
Advances in Cryptology - ASIACRYPT 2003 Lecture Notes in Computer Science | 2010-01-05 | Paper |
An approach for stream ciphers design based on joint computing over random and secret data Computing | 2009-08-10 | Paper |
| Decimation based algebraic and correlation attacks and design of Boolean functions | 2009-02-09 | Paper |
Modeling Block Decoding Approaches for the Fast Correlation Attack IEEE Transactions on Information Theory | 2008-12-21 | Paper |
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks Progress in Cryptology - INDOCRYPT 2005 | 2008-03-17 | Paper |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes Lecture Notes in Computer Science | 2007-02-12 | Paper |
Security in Communication Networks Lecture Notes in Computer Science | 2006-10-10 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
Fast Correlation Attack Algorithm with List Decoding and an Application Fast Software Encryption | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2077096 (Why is no real title available?) | 2004-07-01 | Paper |
| scientific article; zbMATH DE number 2077097 (Why is no real title available?) | 2004-07-01 | Paper |
| scientific article; zbMATH DE number 1951613 (Why is no real title available?) | 2003-07-21 | Paper |
| scientific article; zbMATH DE number 1759271 (Why is no real title available?) | 2002-06-25 | Paper |
A method for convergence analysis of iterative probabilistic decoding IEEE Transactions on Information Theory | 2001-03-19 | Paper |
| scientific article; zbMATH DE number 1504673 (Why is no real title available?) | 2001-01-14 | Paper |
| scientific article; zbMATH DE number 1511967 (Why is no real title available?) | 2000-09-28 | Paper |
| scientific article; zbMATH DE number 1107686 (Why is no real title available?) | 1998-02-16 | Paper |
| scientific article; zbMATH DE number 1186881 (Why is no real title available?) | 1998-01-01 | Paper |
MHD Free Convection from a Vertical Semi‐Infinite Flat Plate with a Step Change in the Magnetic Field ZAMM - Journal of Applied Mathematics and Mechanics / Zeitschrift für Angewandte Mathematik und Mechanik | 1997-11-12 | Paper |
| scientific article; zbMATH DE number 1024086 (Why is no real title available?) | 1997-10-20 | Paper |
| scientific article; zbMATH DE number 1024021 (Why is no real title available?) | 1997-08-14 | Paper |
| scientific article; zbMATH DE number 988753 (Why is no real title available?) | 1997-03-09 | Paper |
| scientific article; zbMATH DE number 503333 (Why is no real title available?) | 1994-05-24 | Paper |
| scientific article; zbMATH DE number 177619 (Why is no real title available?) | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 177058 (Why is no real title available?) | 1993-05-18 | Paper |
A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance Journal of Cryptology | 1991-01-01 | Paper |
A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence Advances in Cryptology — AUSCRYPT '90 | 1990-01-01 | Paper |
Minimal linear equivalent analysis of a variable-memory binary sequence generator IEEE Transactions on Information Theory | 1990-01-01 | Paper |