Browse By Person: Raddum, Havard

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 4.

Journal Article

Dawson, Ed, Henricksen, Matthew, Raddum, Havard, & Z'aba, Muhammad Reza (2008) Bit-pattern based integral attack. Fast Software Encryption (LNCS), 5086, pp. 363-381.
Number of citations in Scopus 31
Number of citations in Web of ScienceĀ® 22

Raddum, Havard & Semaev, Igor (2008) Solving MRHS linear equations. Designs, Codes and Cryptography, 49(1-3), pp. 147-160.

Conference Paper

Z'aba, Muhammad Reza, Raddum, Havard, Simpson, Leonie, Dawson, Ed, Henricksen, Matt, & Wong, Kenneth (2009) Algebraic Analysis of LEX. In Brankovic, Ljiljana & Susilo, Willy (Eds.) Australasian Information Security Conference (AISC2009), 20-23 January 2009, Wellington, New Zealand.
Number of full-text downloads 197
Number of citations in Scopus 2

Babbage, Steve, Cid, Carlos, Pramstaller, Norbert, & Raddum, Havard (2007) An Analysis of the Hermes8 Stream Ciphers. In Pieprzyk, Josef, Ghodosi, Hossein, & Dawson, Edward P. (Eds.) 12th Australasian Conference, ACISP 2007: Information Security and Privacy, July 2-4, 2007, Townsville, Australia.
Number of full-text downloads 94

This list was generated on Sun May 28 07:46:07 2017 AEST.