Cees J. A. Jansen

According to our database1, Cees J. A. Jansen authored at least 17 papers between 1986 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
State space cryptanalysis of the MICKEY cipher.
Proceedings of the 2013 Information Theory and Applications Workshop, 2013

2009
Linearities in Cascade Jump Controlled Stream Ciphers.
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009

2008
Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008

2006
Security of Jump Controlled Sequence Generators for Stream Ciphers.
Proceedings of the Sequences and Their Applications, 2006

2005
Stream Cipher Design based on Jumping Finite State Machines.
IACR Cryptol. ePrint Arch., 2005

1996
Message encipherment with minimal expansion and redundancy - doing better than ISO-10126.
Comput. Secur., 1996

1991
An efficient algorithm for the generation of DeBruijn cycles.
IEEE Trans. Inf. Theory, 1991

Race Integrity Primitives Evaluation (RIPE): A Status Report.
Proceedings of the Advances in Cryptology, 1991

The Maximum Order Complexity of Sequence Ensembles.
Proceedings of the Advances in Cryptology, 1991

1990
On the Construction of Run Permuted Sequences.
Proceedings of the Advances in Cryptology, 1990

On the Significance of the Directed Acyclic Word Graph in Cryptology.
Proceedings of the Advances in Cryptology, 1990

A Binary Sequence Generator Based on Ziv-Lempel Source Coding.
Proceedings of the Advances in Cryptology, 1990

1989
A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation.
Proceedings of the Advances in Cryptology, 1989

The Shortest Feedback Shift Register That Can Generate A Given Sequence.
Proceedings of the Advances in Cryptology, 1989

1987
Modes of Blockcipher Algorithms and their Protection Against Active Eavesdropping.
Proceedings of the Advances in Cryptology, 1987

1986
On the key storage requirements for secure terminals.
Comput. Secur., 1986

Protection Against Active Eavesdropping.
EUROCRYPT, 1986


  Loading...