| Publication | Date of Publication | Type |
|---|
| On period of multiplexed sequences | 2024-07-11 | Paper |
| Edit distance correlation attacks on clock-controlled combiners with memory | 2024-07-11 | Paper |
A cryptanalysis of clock-controlled shift registers with multiple steps Cryptography: Policy and Algorithms | 2019-10-10 | Paper |
A note on nonuniform decimation of periodic sequences Cryptography: Policy and Algorithms | 2019-10-10 | Paper |
Randomness measures related to subset occurrence Cryptography: Policy and Algorithms | 2019-10-10 | Paper |
Techniques for Random Masking in Hardware IEEE Transactions on Circuits and Systems I: Regular Papers | 2017-11-20 | Paper |
On the security of nonlinear filter generators Fast Software Encryption | 2017-11-15 | Paper |
Stream cipher encryption of random access files Information Processing Letters | 2016-06-16 | Paper |
Fast correlation attacks on nonlinear filter generators Information Processing Letters | 2016-05-26 | Paper |
Fast low order approximation of cryptographic functions Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
Cryptanalytic attacks on MIFARE classic protocol Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Optimal correlation attack on the multiplexer generator Information Processing Letters | 2010-08-20 | Paper |
On the resynchronization attack. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Soft Generation of Secure Biometric Keys Information Security and Privacy | 2009-03-06 | Paper |
Entropy Analysis and New Constructions of Biometric Key Generation Systems IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Embedding Probabilities for the Alternating Step Generator IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Vectorial Boolean functions and induced algebraic equations IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Statistical distinguishers for irregularly decimated linear recurring sequences IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Exact Probabilistic Analysis of Memoryless Combiners IEEE Transactions on Information Theory | 2008-12-21 | Paper |
High-Speed True Random Number Generation with Logic Gates Only Cryptographic Hardware and Embedded Systems - CHES 2007 | 2008-09-16 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
| Fibonacci numbers and decimation of binary sequences | 2007-03-30 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2005-12-27 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
Vectorial approach to fast correlation attacks Designs, Codes and Cryptography | 2005-11-07 | Paper |
| scientific article; zbMATH DE number 2086710 (Why is no real title available?) | 2004-08-11 | Paper |
Correlation analysis of the alternating step generator Designs, Codes and Cryptography | 2004-06-11 | Paper |
| scientific article; zbMATH DE number 1979285 (Why is no real title available?) | 2003-09-11 | Paper |
Edit probability correlation attacks on stop/go clocked keystream generators Journal of Cryptology | 2003-08-27 | Paper |
Linear models for keystream generators IEEE Transactions on Computers | 2003-06-25 | Paper |
Statistical weakness of multiplexed sequences Finite Fields and their Applications | 2003-04-02 | Paper |
| scientific article; zbMATH DE number 1842506 (Why is no real title available?) | 2002-12-08 | Paper |
Cryptanalysis of three mutually clock-controlled stop/go shift registers IEEE Transactions on Information Theory | 2002-10-30 | Paper |
| scientific article; zbMATH DE number 1500493 (Why is no real title available?) | 2002-08-14 | Paper |
Iterative optimum symbol-by-symbol decoding and fast correlation attacks IEEE Transactions on Information Theory | 2002-08-04 | Paper |
Edit distances and probabilities for correlation attacks on clock-controlled combiners with memory IEEE Transactions on Information Theory | 2002-08-04 | Paper |
A probabilistic cryptanalytic method for a time-variant permutation generator Information Processing Letters | 2002-07-14 | Paper |
Computation of edit probabilities and edit distances for the A5-type keystream generator Journal of Complexity | 2002-06-05 | Paper |
| scientific article; zbMATH DE number 1744098 (Why is no real title available?) | 2002-05-22 | Paper |
| scientific article; zbMATH DE number 1740042 (Why is no real title available?) | 2002-05-14 | Paper |
Recent advances in stream cipher cryptanalysis Publications de l'Institut Mathématique. Nouvelle Série | 2002-02-26 | Paper |
| scientific article; zbMATH DE number 1689010 (Why is no real title available?) | 2002-01-09 | Paper |
| scientific article; zbMATH DE number 1689041 (Why is no real title available?) | 2002-01-09 | Paper |
| scientific article; zbMATH DE number 1676647 (Why is no real title available?) | 2001-11-25 | Paper |
| scientific article; zbMATH DE number 1588475 (Why is no real title available?) | 2001-07-17 | Paper |
| scientific article; zbMATH DE number 1612513 (Why is no real title available?) | 2001-07-01 | Paper |
On matroid characterization of ideal secret sharing schemes Journal of Cryptology | 2001-05-20 | Paper |
A method for convergence analysis of iterative probabilistic decoding IEEE Transactions on Information Theory | 2001-03-19 | Paper |
Linear models for a time-variant permutation generator IEEE Transactions on Information Theory | 2000-09-07 | Paper |
On the security of shift register based keystream generators Fast Software Encryption | 2000-08-30 | Paper |
| scientific article; zbMATH DE number 1484323 (Why is no real title available?) | 2000-08-03 | Paper |
| scientific article; zbMATH DE number 1424172 (Why is no real title available?) | 2000-06-07 | Paper |
| scientific article; zbMATH DE number 1455088 (Why is no real title available?) | 2000-06-05 | Paper |
Fast correlation attacks on the summation generator. Journal of Cryptology | 2000-01-01 | Paper |
Correlation attacks on up/down and stop/go cascades IEEE Transactions on Information Theory | 1999-11-21 | Paper |
Periods of interleaved and nonuniformly decimated sequences IEEE Transactions on Information Theory | 1999-05-26 | Paper |
| scientific article; zbMATH DE number 1189377 (Why is no real title available?) | 1998-10-08 | Paper |
| scientific article; zbMATH DE number 1191214 (Why is no real title available?) | 1998-08-16 | Paper |
| scientific article; zbMATH DE number 1088918 (Why is no real title available?) | 1998-01-14 | Paper |
Constrained Embedding Probability for Two Binary Strings SIAM Journal on Discrete Mathematics | 1998-01-12 | Paper |
| scientific article; zbMATH DE number 1189375 (Why is no real title available?) | 1998-01-01 | Paper |
| scientific article; zbMATH DE number 1088256 (Why is no real title available?) | 1997-11-17 | Paper |
Correlation properties of a general binary combiner with memory Journal of Cryptology | 1997-11-02 | Paper |
| scientific article; zbMATH DE number 1024497 (Why is no real title available?) | 1997-10-20 | Paper |
Constrained many-to-one string editing with memory Information Sciences | 1997-06-23 | Paper |
| scientific article; zbMATH DE number 1024088 (Why is no real title available?) | 1997-06-18 | Paper |
| scientific article; zbMATH DE number 845720 (Why is no real title available?) | 1996-11-12 | Paper |
Correlation attacks on clock-controlled shift registers in keystream generators IEEE Transactions on Computers | 1996-01-01 | Paper |
| scientific article; zbMATH DE number 503333 (Why is no real title available?) | 1994-05-24 | Paper |
String editing under a combination of constraints Information Sciences | 1994-03-13 | Paper |
| scientific article; zbMATH DE number 503362 (Why is no real title available?) | 1994-02-22 | Paper |
| scientific article; zbMATH DE number 503332 (Why is no real title available?) | 1994-02-22 | Paper |
| scientific article; zbMATH DE number 177619 (Why is no real title available?) | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 177058 (Why is no real title available?) | 1993-05-18 | Paper |
The Number of Output Sequences of a Binary Sequence Generator Advances in Cryptology — EUROCRYPT ’91 | 1993-05-18 | Paper |
A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance Journal of Cryptology | 1991-01-01 | Paper |
A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence Advances in Cryptology — AUSCRYPT '90 | 1990-01-01 | Paper |
Minimal linear equivalent analysis of a variable-memory binary sequence generator IEEE Transactions on Information Theory | 1990-01-01 | Paper |
On the linear complexity of functions of periodic GF(q) sequences IEEE Transactions on Information Theory | 1989-01-01 | Paper |
On the linear complexity of nonuniformity decimated PN-sequences IEEE Transactions on Information Theory | 1989-01-01 | Paper |
On the relationship between the information measures and the Bayes probability of error IEEE Transactions on Information Theory | 1987-01-01 | Paper |
On the relationship between the separability measures and the Bayes probability of error IEEE Transactions on Information Theory | 1987-01-01 | Paper |
On the relationship between the efficiency measures of multicategory information systems IEEE Transactions on Information Theory | 1987-01-01 | Paper |