The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Gautham Sekar" ( http://dblp.L3S.de/Authors/Gautham_Sekar )

  Author page on DBLP  Author page in RDF  Community of Gautham Sekar in ASPL-2

Publication years (Num. hits)
2006-2011 (16) 2012-2016 (6)
Publication types (Num. hits)
article(7) inproceedings(14) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2 occurrences of 2 keywords

Results
Found 23 publication records. Showing 22 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Gautham Sekar, Soumyadeep Bhattacharya Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions. Search on Bibsonomy JIPS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mabin Joseph, Gautham Sekar, R. Balasubramanian Distinguishing Attacks on (Ultra-)Lightweight WG Ciphers. Search on Bibsonomy LightSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gautham Sekar Side Channel Cryptanalysis of Streebog. Search on Bibsonomy SSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gautham Sekar, Soumyadeep Bhattacharya Practical (Second) Preimage Attacks on TCS_SHA-3. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2013 DBLP  BibTeX  RDF
1Gautham Sekar The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2012 DBLP  BibTeX  RDF
1Nicky Mouha, Gautham Sekar, Bart Preneel Challenging the increased resistance of regular hash functions against birthday attacks. Search on Bibsonomy J. Mathematical Cryptology The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gautham Sekar The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures. Search on Bibsonomy Inscrypt The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gautham Sekar, Nicky Mouha, Vesselin Velichkov, Bart Preneel Meet-in-the-Middle Attacks on Reduced-Round XTEA. Search on Bibsonomy CT-RSA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gautham Sekar, Bart Preneel Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313. Search on Bibsonomy WISA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gautham Sekar Cryptanalysis and Design of Symmetric Cryptographic Algorithms (Cryptanalyse en ontwerp van symmetrische cryptografische algoritmen). (PDF / PS) Search on Bibsonomy 2011   RDF
1Gautham Sekar, Bart Preneel Improved Distinguishing Attacks on HC-256. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson, Thomas Peyrin, Søren S. Thomsen, Meltem Sönmez Turan, Bart Preneel Cryptanalysis of the ESSENCE Family of Hash Functions. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel A New Approach to chi2 Cryptanalysis of Block Ciphers. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ? 2, square and linear cryptanalysis, Block ciphers
1Emilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw, Gautham Sekar Correlated Keystreams in Moustique. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Moustique, related keys, eSTREAM
1Gautham Sekar, Souradyuti Paul, Bart Preneel Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2007 DBLP  BibTeX  RDF
1Gautham Sekar, Souradyuti Paul, Bart Preneel New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2007 DBLP  BibTeX  RDF
1Gautham Sekar, Souradyuti Paul, Bart Preneel New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2007 DBLP  BibTeX  RDF
1Gautham Sekar, Souradyuti Paul, Bart Preneel New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Gautham Sekar, Souradyuti Paul, Bart Preneel Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Orr Dunkelman, Gautham Sekar, Bart Preneel Improved Meet-in-the-Middle Attacks on Reduced-Round DES. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Gautham Sekar, Souradyuti Paul, Bart Preneel New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Souradyuti Paul, Bart Preneel, Gautham Sekar Distinguishing Attacks on the Stream Cipher Py. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #22 of 22 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license