Weaknesses in the temporal key hash of WPA V Moen, H Raddum, KJ Hole ACM SIGMOBILE Mobile Computing and Communications Review 8 (2), 76-83, 2004 | 112 | 2004 |
Bit-pattern based integral attack MR Z’aba, H Raddum, M Henricksen, E Dawson Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008 | 99 | 2008 |
New technique for solving sparse equation systems H Raddum, I Semaev Cryptology ePrint Archive, 2006 | 80 | 2006 |
Solving multiple right hand sides linear equations H Raddum, I Semaev Designs, Codes and Cryptography 49, 147-160, 2008 | 53 | 2008 |
Influence of addition modulo 2 n on algebraic attacks O Kazymyrov, R Oliynykov, H Raddum Cryptography and Communications 8, 277-289, 2016 | 33 | 2016 |
Security analysis of mobile phones used as OTP generators H Raddum, LH Nestås, KJ Hole Information Security Theory and Practices. Security and Privacy of Pervasive …, 2010 | 33 | 2010 |
More dual rijndaels H Raddum Advanced Encryption Standard–AES: 4th International Conference, AES 2004 …, 2005 | 33 | 2005 |
Comments by the NESSIE Project on the AES Finalists B Preneel, A Bosselaers, V Rijmen, B Van Rompay, L Granboulan, ... AES Round 2, 2000 | 27 | 2000 |
NESSIE security report B Preneel, A Biryukov, E Oswald, BV Rompay, L Granboulan, E Dottax, ... Deliverable D20, NESSIE Consortium. Feb, 2003 | 25 | 2003 |
Algebraic analysis of the simon block cipher family H Raddum Progress in Cryptology--LATINCRYPT 2015: 4th International Conference on …, 2015 | 24 | 2015 |
Cryptanalysis of PRINCE with minimal data S Rasoolzadeh, H Raddum Progress in Cryptology–AFRICACRYPT 2016: 8th International Conference on …, 2016 | 21 | 2016 |
MRHS equation systems H Raddum Selected Areas in Cryptography: 14th International Workshop, SAC 2007 …, 2007 | 21 | 2007 |
Solving MRHS linear equations H Raddum, I Semaev Cryptology ePrint Archive, 2007 | 21 | 2007 |
Final report of European project number IST-1999-12324, named New European Schemes for Signatures, Integrity, and Encryption B Preneel, A Biryukov, C De Cannière, SB Örs, E Oswald, B Van Rompay, ... Berlin Heidelberg NewYork London Paris Tokyo Hong Kong Barcelona Budapest …, 2004 | 21 | 2004 |
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2 C Beierle, P Derbez, G Leander, G Leurent, H Raddum, Y Rotella, ... Annual International Conference on the Theory and Applications of …, 2021 | 19 | 2021 |
Cryptanalysis of IDEA-X/2 H Raddum Fast Software Encryption: 10th International Workshop, FSE 2003, Lund …, 2003 | 18 | 2003 |
Cryptanalytic Results on TRIVIUM. eSTREAM, ECRYPT stream cipher project, Report 2006/039, 2006 H Raddum | 18 | |
Faster key recovery attack on round-reduced PRINCE S Rasoolzadeh, H Raddum Lightweight Cryptography for Security and Privacy: 5th International …, 2017 | 17 | 2017 |
Analysis of trivium using compressed right hand side equations TE Schilling, H Raddum Information Security and Cryptology-ICISC 2011: 14th International …, 2012 | 16 | 2012 |
NESSIE security report, version 2.0 B Preneel, A Biryukov, E Oswald, B Van Rompay, L Granboulan, E Dottax, ... NESSIE Deliverable D 20, 2003 | 16 | 2003 |