Search results for: Marc P. C. Fossorier
IEEE Transactions on Information Theory > 2017 > 63 > 3 > 1463 - 1475
Progress in Computer Science and Applied Logic > Coding, Cryptography and Combinatorics > Contributed Papers > 331-343
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > Cryptography > 282-293
Lecture Notes in Computer Science > Digital Rights Management. Technologies, Issues, Challenges and Systems > Supporting Cryptographic Technology > 228-245
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2005 > Cryptanalysis I > 155-168
Lecture Notes in Computer Science > Fast Software Encryption > General Stream-Cipher Cryptanalysis > 196-212
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2006 > Symmetric Cryptography: Attacks > 48-62
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > 203-214
Lecture Notes in Computer Science > Fast Software Encryption > Cryptanalysis of Stream Ciphers II > 196-210
Lecture Notes in Computer Science > Digital Rights Management. Technologies, Issues, Challenges and Systems > Supporting Cryptographic Technology > 258-276
IEEE Transactions on Information Theory > 2013 > 59 > 11 > 7212 - 7228
IEEE Transactions on Communications > 2012 > 60 > 12 > 3587 - 3596
IEEE Transactions on Information Theory > 2012 > 58 > 4 > 2321 - 2329
IEEE Transactions on Communications > 2011 > 59 > 11 > 3007 - 3015
IEEE Transactions on Communications > 2010 > 58 > 6 > 1601 - 1604