Weaknesses in the temporal key hash of WPA V Moen, H Raddum, KJ Hole ACM SIGMOBILE Mobile Computing and Communications Review 8 (2), 76-83, 2004 | 109 | 2004 |
Bit-pattern based integral attack MR Z’aba, H Raddum, M Henricksen, E Dawson International Workshop on Fast Software Encryption, 363-381, 2008 | 95 | 2008 |
New technique for solving sparse equation systems H Raddum, I Semaev Cryptology ePrint Archive, 2006 | 73 | 2006 |
Solving multiple right hand sides linear equations H Raddum, I Semaev Designs, Codes and Cryptography 49 (1), 147-160, 2008 | 50 | 2008 |
Security analysis of mobile phones used as OTP generators H Raddum, LH Nestås, KJ Hole IFIP International Workshop on Information Security Theory and Practices …, 2010 | 33 | 2010 |
More dual rijndaels H Raddum International Conference on Advanced Encryption Standard, 142-147, 2004 | 32 | 2004 |
Influence of addition modulo 2 n on algebraic attacks O Kazymyrov, R Oliynykov, H Raddum Cryptography and Communications 8 (2), 277-289, 2016 | 31 | 2016 |
Comments by the NESSIE Project on the AES Finalists B Preneel, A Bosselaers, B Preneel, A Bosselaers, V Rijmen, J Stern, ... | 27 | 2000 |
NESSIE security report B Preneel, A Biryukov, E Oswald, BV Rompay, L Granboulan, E Dottax, ... Deliverable D20, NESSIE Consortium. Feb, 2003 | 24 | 2003 |
Algebraic analysis of the simon block cipher family H Raddum International Conference on Cryptology and Information Security in Latin …, 2015 | 23 | 2015 |
Solving MRHS linear equations H Raddum, I Semaev Cryptology ePrint Archive, 2007 | 20 | 2007 |
Final report of European project number IST-1999-12324, named New European Schemes for Signatures, Integrity, and Encryption B Preneel, A Biryukov, C De Cannière, SB Örs, E Oswald, B Van Rompay, ... Berlin Heidelberg NewYork London Paris Tokyo Hong Kong Barcelona Budapest …, 2004 | 20 | 2004 |
MRHS equation systems H Raddum International Workshop on Selected Areas in Cryptography, 232-245, 2007 | 19 | 2007 |
Cryptanalytic Results on Trivium. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/039 (2006) H Raddum | 19 | |
Cryptanalysis of IDEA-X/2 H Raddum International Workshop on Fast Software Encryption, 1-8, 2003 | 18 | 2003 |
NESSIE security report, version 2.0 B Preneel, A Biryukov, E Oswald, B Van Rompay, L Granboulan, E Dottax, ... NESSIE Deliverable D 20, 2003 | 18 | 2003 |
Faster key recovery attack on round-reduced PRINCE S Rasoolzadeh, H Raddum International Workshop on Lightweight Cryptography for Security and Privacy …, 2016 | 17 | 2016 |
Cryptanalysis of PRINCE with minimal data S Rasoolzadeh, H Raddum International Conference on Cryptology in Africa, 109-126, 2016 | 17 | 2016 |
Analysis of trivium using compressed right hand side equations TE Schilling, H Raddum International Conference on Information Security and Cryptology, 18-32, 2011 | 16 | 2011 |
Solving compressed right hand side equation systems with linear absorption TE Schilling, H Raddum International Conference on Sequences and Their Applications, 291-302, 2012 | 14 | 2012 |