Search

Your search keyword '"Sekar, Gautham"' showing total 40 results

Search Constraints

Start Over You searched for: Author "Sekar, Gautham" Remove constraint Author: "Sekar, Gautham"
40 results on '"Sekar, Gautham"'

Search Results

2. Revisiting the Software-Efficient Stream Ciphers RCR-64 and RCR-32.

3. Distinguishing Attacks on (Ultra-)Lightweight WG Ciphers

5. Side Channel Cryptanalysis of Streebog

6. The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures

7. Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313

8. Meet-in-the-Middle Attacks on Reduced-Round XTEA

9. Cryptanalysis of the ESSENCE Family of Hash Functions

10. Improved Distinguishing Attacks on HC-256

11. A New Approach to χ 2 Cryptanalysis of Block Ciphers

12. Correlated Keystreams in Moustique

13. New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B

14. Improved Meet-in-the-Middle Attacks on Reduced-Round DES

15. Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses

16. New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py

17. Distinguishing Attacks on the Stream Cipher Py

18. Challenging the increased resistance of regular hash functions against birthday attacks

19. On the Security of the Stream Ciphers RCR-64 and RCR-32.

35. Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions.

36. Cryptanalysis of the ESSENCE Family of Hash Functions.

37. Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses.

38. Improved Meet-in-the-Middle Attacks on Reduced-Round DES.

39. New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py.

40. Distinguishing Attacks on the Stream Cipher Py.

Catalog

Books, media, physical & digital resources