Gregory G. Rose

According to our database1, Gregory G. Rose authored at least 24 papers between 1978 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung.
Comput. J., June, 2023

2018
KISS: A bit too simple.
Cryptogr. Commun., 2018

2011
Attacks on a lightweight cipher based on a multiple recursive generator.
Secur. Commun. Networks, 2011

2009
More Di fferential Paths of TIB3.
IACR Cryptol. ePrint Arch., 2009

2008
Specification for NLSv2.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008

2007
Design and Primitive Specification for Shannon.
IACR Cryptol. ePrint Arch., 2007

2005
Security/Cryptography.
Proceedings of the 19th Conference on Systems Administration (LISA 2005), 2005

2004
Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers.
IACR Cryptol. ePrint Arch., 2004

The Mundja Streaming MAC.
IACR Cryptol. ePrint Arch., 2004

Musings on the Wang et al. MD5 Collision.
IACR Cryptol. ePrint Arch., 2004

On Corrective Patterns for the SHA-2 Family.
IACR Cryptol. ePrint Arch., 2004

2003
Primitive Specification for SOBER-128.
IACR Cryptol. ePrint Arch., 2003

A Mode of Operation with Partial Encryption and Message Integrity.
IACR Cryptol. ePrint Arch., 2003

2002
Turing, a fast stream cipher.
IACR Cryptol. ePrint Arch., 2002

On the Applicability of Distinguishing Attacks Against Stream Ciphers.
IACR Cryptol. ePrint Arch., 2002

Guess-and-Determine Attacks on SNOW.
Proceedings of the Selected Areas in Cryptography, 2002

2001
A Practical Cryptanalysis of SSC2.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

PKI/Cryptography.
Proceedings of the 15th Conference on Systems Administration (LISA 2001), 2001

Where Has All the Crypto Gone? Long Time Coming: A Speculative and Historical Talk.
Proceedings of the 15th Conference on Systems Administration (LISA 2001), 2001

2000
Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers.
Proceedings of the Advances in Cryptology, 2000

1999
ssmail: Opportunistic Encryption in sendmail.
Proceedings of the 13th Conference on Systems Administration (LISA-99), 1999

1998
A Stream Cipher Based on Linear Feedback over GF(2<sup>8</sup>).
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1996
The PGP Moose - Implementation and Experience.
Proceedings of the 10th Conference on Systems Administration (LISA 1996), Chicago, IL, USA, September 29, 1996

1978
Performance Evaluation under Unix and a Study of PDP-11 Instruction Usage.
ACM SIGOPS Oper. Syst. Rev., 1978


  Loading...