Gautham Sekar
According to our database1,
Gautham Sekar
authored at least 22 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
2022
2020
2016
Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions.
J. Inf. Process. Syst., 2016
Proceedings of the Lightweight Cryptography for Security and Privacy, 2016
2015
Proceedings of the Security Standardisation Research - Second International Conference, 2015
2013
2012
Challenging the increased resistance of regular hash functions against birthday attacks.
J. Math. Cryptol., 2012
The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures.
IACR Cryptol. ePrint Arch., 2012
2011
Cryptanalysis and Design of Symmetric Cryptographic Algorithms (Cryptanalyse en ontwerp van symmetrische cryptografische algoritmen).
PhD thesis, 2011
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
2009
Proceedings of the Advances in Information and Computer Security, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
2008
2007
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B.
IACR Cryptol. ePrint Arch., 2007
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py.
IACR Cryptol. ePrint Arch., 2007
Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy.
IACR Cryptol. ePrint Arch., 2007
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses.
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Progress in Cryptology, 2007
2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006