Lu, Yi; Desmedt, Yvo Walsh transforms and cryptographic applications in bias computing. (English) Zbl 1382.94136 Cryptogr. Commun. 8, No. 3, 435-453 (2016). MSC: 94A60 62E15 68Q25 06E30 PDFBibTeX XMLCite \textit{Y. Lu} and \textit{Y. Desmedt}, Cryptogr. Commun. 8, No. 3, 435--453 (2016; Zbl 1382.94136) Full Text: DOI
Lu, Yi; Desmedt, Yvo Bias analysis of a certain problem with applications to E0 and Shannon cipher. (English) Zbl 1297.94089 Rhee, Kyung-Hyune (ed.) et al., Information security and cryptology – ICISC 2010. 13th international conference, Seoul, Korea, December 1–3, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-24208-3/pbk). Lecture Notes in Computer Science 6829, 16-28 (2011). MSC: 94A60 06E30 68P25 68Q25 94C10 PDFBibTeX XMLCite \textit{Y. Lu} and \textit{Y. Desmedt}, Lect. Notes Comput. Sci. 6829, 16--28 (2011; Zbl 1297.94089) Full Text: DOI
Lu, Yi; Desmedt, Yvo Improved distinguishing attack on Rabbit. (English) Zbl 1371.94649 Burmester, Mike (ed.) et al., Information security. 13th international conference, ISC 2010, Boca Raton, FL, USA, October 25–28, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-18177-1/pbk). Lecture Notes in Computer Science 6531, 17-23 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Lu} and \textit{Y. Desmedt}, Lect. Notes Comput. Sci. 6531, 17--23 (2011; Zbl 1371.94649) Full Text: DOI