Finite Fields In Encyclopedia of Mathematics and its Applications, 1997. ,
Signal Design for Good Correlation: For Wireless Communication , Cryptography, and Radar, 2004. ,
DOI : 10.1017/CBO9780511546907
Algebraic Attacks on Combiners with Memory, Lecture Notes in Computer Science, vol.2729, pp.162-176, 2003. ,
DOI : 10.1007/978-3-540-45146-4_10
Improving Fast Algebraic Attacks, Lecture Notes in Computer Science, vol.3017, pp.65-82, 2004. ,
DOI : 10.1007/978-3-540-25937-4_5
Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers, Advances in Cryptology -CRYPTO 2004: 24th Annual International Cryptology Conference Proceedings, Lecture Notes in Computer Science, 2004. ,
DOI : 10.1007/978-3-540-28628-8_24
Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity, Mycrypt 2005 (International Conference on Cryptology in Malaysia), pp.16-32, 2005. ,
DOI : 10.1007/11554868_3
URL : https://hal.archives-ouvertes.fr/hal-01351381
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback, Lecture Notes in Computer Science, vol.2729, pp.176-194, 2003. ,
DOI : 10.1007/978-3-540-45146-4_11
On the singularity of generalised Vandermonde matrices over finite fields, Finite Fields and Applications, pp.193-199, 2005. ,
DOI : 10.1016/j.ffa.2004.11.001
Algebraic Attacks on Stream Ciphers with Linear Feedback, Lecture Notes in Computer Science, vol.2656, pp.345-359, 2003. ,
DOI : 10.1007/3-540-39200-9_21
Fast linear subspace attacks on stream ciphers ,
Algebraic Attacks and Decomposition of Boolean Functions, Advances in Cryptology ? EUROCRYPT, pp.474-491, 2004. ,
DOI : 10.1007/978-3-540-24676-3_28
Specification of the 3GPP Confidentiality and Integrity Algorithms UEA& UIA2 Document 2: Snow 3G Specification (version 1.1), 2006. ,
A New Attack on the Filter Generator, IEEE Transactions on Information Theory, vol.53, issue.5, pp.17520-1758, 2007. ,
DOI : 10.1109/TIT.2007.894690
Hardware implementations of the WG-5 cipher for passive RFID tags, 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp.29-34, 2013. ,
DOI : 10.1109/HST.2013.6581561
A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp.1-6, 2010. ,
DOI : 10.1109/GLOCOM.2010.5684215
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices, Quality, Reliability, Security and Robustness in Heterogeneous Networks,Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ,
Specification of the Stream Cipher WG-16 Based Confidentiality and Integrity Algorithms ,
The WG Stream Cipher, EU ECRYPT eSTREAM competition ,
Attacking the Filter Generator over GF(2 m ), Lecture Notes in Computer Science, vol.4547, pp.264-275, 2007. ,
DOI : 10.1007/978-3-540-73074-3_20
Simplifying algebraic attacks with univariate analysis, 2011 Information Theory and Applications Workshop, pp.1-7, 2011. ,
DOI : 10.1109/ITA.2011.5743578
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback, Advances in Cryptology -CRYPTO 2003, number 2729 in Lecture Notes in Computer Science, pp.176-194, 2003. ,
DOI : 10.1007/978-3-540-45146-4_11
Cryptanalysis of WG-7: a lightweight stream cipher, Cryptography and Communications, pp.3-4, 2012. ,
DOI : 10.1007/s12095-012-0070-x