Pouyan Sepehrdad

According to our database1, Pouyan Sepehrdad authored at least 18 papers between 2009 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations.
Int. J. Inf. Sec., 2016

Predicting Outcomes of ElimLin Attack on Lightweight Block Cipher Simon.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

2015
Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions.
J. Cryptol., 2015

Tornado Attack on RC4 with Applications to WEP & WPA.
IACR Cryptol. ePrint Arch., 2015

2014
Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon.
Proceedings of the SECRYPT 2014, 2014

On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Smashing WEP in a Passive Attack.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
Statistical and Algebraic Cryptanalysis of Lightweight and Ultra-Lightweight Symmetric Primitives.
PhD thesis, 2012

Recursive Diffusion Layers for Block Ciphers and Hash Functions.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

ElimLin Algorithm Revisited.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

2011
Statistical Attack on RC4 - Distinguishing WPA.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Fast Key Recovery Attack on ARMADILLO1 and Variants.
Proceedings of the Smart Card Research and Advanced Applications, 2011

2010
Discovery and Exploitation of New Biases in RC4.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Distinguishing Distributions Using Chernoff Information.
Proceedings of the Provable Security - 4th International Conference, 2010

Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2).
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009


  Loading...