Search results for: Alex Biryukov
Journal of Cryptographic Engineering > 2019 > 9 > 3 > 283-302
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2011 > Hash Function > 270-287
Lecture Notes in Computer Science
Lecture Notes in Computer Science > Information and Communications Security > Cryptanalysis > 147-158
Lecture Notes in Computer Science > Advances in Cryptology – EUROCRYPT 2010 > Automated Tools and Formal Methods > 322-344
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2004 > Linear Cryptanalysis > 1-22
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2001 > Symmetric Ciphers > 395-405
Lecture Notes in Computer Science > Security and Cryptography for Networks > Symmetric Key Cryptanalysis and Randomness > 242-256
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Session 2: Attacks I > 91-109