|
Search the dblp DataBase
Souradyuti Paul:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Souradyuti Paul, Bart Preneel
Solving Systems of Differential Equations of Addition. [Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:75-88 [Conf]
- Souradyuti Paul, Bart Preneel
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2006, pp:69-83 [Conf]
- Souradyuti Paul, Bart Preneel
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:245-259 [Conf]
- Souradyuti Paul, Bart Preneel, Gautham Sekar
Distinguishing Attacks on the Stream Cipher Py. [Citation Graph (0, 0)][DBLP] FSE, 2006, pp:405-421 [Conf]
- Souradyuti Paul, Bart Preneel
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2003, pp:52-67 [Conf]
- Souradyuti Paul, Bart Preneel
Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2005, pp:90-103 [Conf]
- Gautham Sekar, Souradyuti Paul, Bart Preneel
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:249-262 [Conf]
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses. [Citation Graph (, )][DBLP]
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|