Search results for: Shahram Khazaei
Designs, Codes and Cryptography > 2019 > 87 > 1 > 123-147
Wireless Networks > 2019 > 25 > 3 > 1235-1252
Wireless Personal Communications > 2017 > 95 > 4 > 5057-5080
Information Processing Letters > 2017 > 118 > C > 25-29
Lecture Notes in Computer Science > Fast Software Encryption > Stream Cipher Cryptanalysis (II) > 470-488
Lecture Notes in Computer Science > Sequences and Their Applications – SETA 2006 > Stream Ciphers and Transforms > 141-152
Lecture Notes in Computer Science > Mathematical Methods in Computer Science > Cryptography II > 179-189
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2008 > Analysis of Stream Ciphers > 236-245
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2008 > Stream Ciphers > 15-26
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2009 > Hash Functions III > 560-577
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2010 > Ciphers and Hash Functions > 407-418