The following pages link to Gautham Sekar (Q3056876):
Displaying 13 items.
- Cryptanalysis of the ESSENCE Family of Hash Functions (Q3056877) (← links)
- Meet-in-the-Middle Attacks on Reduced-Round XTEA (Q3073711) (← links)
- A New Approach to χ 2 Cryptanalysis of Block Ciphers (Q3399196) (← links)
- Correlated Keystreams in Moustique (Q3506385) (← links)
- New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py (Q3507878) (← links)
- Distinguishing Attacks on the Stream Cipher Py (Q3618667) (← links)
- Improved Distinguishing Attacks on HC-256 (Q3638981) (← links)
- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures (Q4899213) (← links)
- Challenging the increased resistance of regular hash functions against birthday attacks (Q4902743) (← links)
- Атака на ГОСТ с уменьшенным числом итераций методом согласования (Q5152360) (← links)
- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses (Q5458201) (← links)
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES (Q5458203) (← links)
- New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B (Q5504557) (← links)