40 results on '"Sekar, Gautham"'
Search Results
2. Revisiting the Software-Efficient Stream Ciphers RCR-64 and RCR-32.
3. Distinguishing Attacks on (Ultra-)Lightweight WG Ciphers
4. Revisiting the Software-Efficient Stream Ciphers RCR-64 and RCR-32
5. Side Channel Cryptanalysis of Streebog
6. The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures
7. Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313
8. Meet-in-the-Middle Attacks on Reduced-Round XTEA
9. Cryptanalysis of the ESSENCE Family of Hash Functions
10. Improved Distinguishing Attacks on HC-256
11. A New Approach to χ 2 Cryptanalysis of Block Ciphers
12. Correlated Keystreams in Moustique
13. New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
14. Improved Meet-in-the-Middle Attacks on Reduced-Round DES
15. Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
16. New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
17. Distinguishing Attacks on the Stream Cipher Py
18. Challenging the increased resistance of regular hash functions against birthday attacks
19. On the Security of the Stream Ciphers RCR-64 and RCR-32.
20. Side Channel Cryptanalysis of Streebog
21. On the Security of the Stream Ciphers RCR-64 and RCR-32
22. The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures
23. Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313
24. Meet-in-the-Middle Attacks on Reduced-Round XTEA
25. Cryptanalysis of the ESSENCE Family of Hash Functions
26. Improved Distinguishing Attacks on HC-256
27. Side channel analysis of SPECK
28. Distinguishing Attacks on the Stream Cipher Py
29. New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
30. Improved Meet-in-the-Middle Attacks on Reduced-Round DES
31. Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
32. New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
33. Correlated Keystreams in Moustique
34. Атака на ГОСТ с уменьшенным числом итераций методом согласования
35. Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions.
36. Cryptanalysis of the ESSENCE Family of Hash Functions.
37. Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses.
38. Improved Meet-in-the-Middle Attacks on Reduced-Round DES.
39. New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py.
40. Distinguishing Attacks on the Stream Cipher Py.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.