Matthew J. B. Robshaw

From MaRDI portal
(Redirected from Person:610285)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On the design and security of RC2
Fast Software Encryption
2018-05-09Paper
Searching for compact algorithms: \texttt{CGEN}
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Non-linear approximations in linear cryptanalysis
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
On area, time, and the right trade-off
Information Security and Privacy
2012-09-07Paper
On related-key attacks and KASUMI: the case of A5/3
Lecture Notes in Computer Science
2011-12-16Paper
The LED block cipher
Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
2011-10-07Paper
The block cipher companion.
Information Security and Cryptography
2010-12-08Paper
On unbiased linear approximations
Information Security and Privacy
2010-10-25Paper
PRINTcipher: A Block Cipher for IC-Printing
Cryptographic Hardware and Embedded Systems, CHES 2010
2010-08-17Paper
The Intel AES instructions set and the SHA-3 candidates
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
The Cryptanalysis of Reduced-Round SMS4
Selected Areas in Cryptography
2009-11-03Paper
On Building Hash Functions from Multivariate Quadratic Equations
Information Security and Privacy
2009-03-06Paper
Good Variants of HB +  Are Hard to Find
Financial Cryptography and Data Security
2009-02-12Paper
Hash Functions and RFID Tags: Mind the Gap
Cryptographic Hardware and Embedded Systems – CHES 2008
2009-01-09Paper
PRESENT: An Ultra-Lightweight Block Cipher
Cryptographic Hardware and Embedded Systems - CHES 2007
2008-09-16Paper
How to Encrypt with the LPN Problem
Automata, Languages and Programming
2008-08-19Paper
Looking Back at a New Hash Function
Information Security and Privacy
2008-07-08Paper
Correlated Keystreams in Moustique
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
Combining Compression Functions and Block Cipher-Based Hash Functions
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
: Increasing the Security and Efficiency of
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Non-randomness in eSTREAM Candidates Salsa20 and TSC-4
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
On the state of the AES and cryptographic hashing2008-03-05Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Algebraic aspects of the advanced encryption standard.2006-08-29Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Advanced Encryption Standard – AES
Lecture Notes in Computer Science
2005-09-14Paper
scientific article; zbMATH DE number 1942409 (Why is no real title available?)2003-06-30Paper
Key-dependent S-boxes and differential cryptanalysis
Designs, Codes and Cryptography
2003-04-03Paper
scientific article; zbMATH DE number 1617919 (Why is no real title available?)2001-07-12Paper
Fast block cipher proposal
Fast Software Encryption
2000-08-30Paper
scientific article; zbMATH DE number 1418294 (Why is no real title available?)2000-07-26Paper
scientific article; zbMATH DE number 1418240 (Why is no real title available?)2000-07-19Paper
scientific article; zbMATH DE number 1455103 (Why is no real title available?)2000-06-05Paper
scientific article; zbMATH DE number 1406764 (Why is no real title available?)2000-03-01Paper
Storage efficient decoding for a class of binary de Bruijn sequences
Discrete Mathematics
1995-08-08Paper
On evaluating the linear complexity of a sequence of least period \(2^ n\)
Designs, Codes and Cryptography
1994-09-04Paper
Increasing the rate of output for m sequences
Electronics Letters
1992-06-28Paper


Research outcomes over time


This page was built for person: Matthew J. B. Robshaw