Gordon Procter

According to our database1, Gordon Procter authored at least 6 papers between 2014 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
The design and analysis of symmetric cryptosystems.
PhD thesis, 2015

On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.
J. Cryptol., 2015

Algebraic Cryptanalysis and RFID Authentication.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2015

2014
A Security Analysis of the Composition of ChaCha20 and Poly1305.
IACR Cryptol. ePrint Arch., 2014

A Note on the CLRW2 Tweakable Block Cipher Construction.
IACR Cryptol. ePrint Arch., 2014

The Related-Key Security of Iterated Even-Mansour Ciphers.
IACR Cryptol. ePrint Arch., 2014


  Loading...