Gordon Procter
Gordon Procter
Verified email at live.rhul.ac.uk
Title
Cited by
Cited by
Year
On weak keys and forgery attacks against polynomial-based MAC schemes
G Procter, C Cid
Journal of Cryptology 28 (4), 769-795, 2015
622015
A Security Analysis of the Composition of ChaCha20 and Poly1305.
G Procter
IACR Cryptol. ePrint Arch. 2014, 613, 2014
392014
The related-key security of iterated Even–Mansour ciphers
P Farshim, G Procter
International Workshop on Fast Software Encryption, 342-363, 2015
382015
A Note on the CLRW2 Tweakable Block Cipher Construction.
G Procter
IACR Cryptol. ePrint Arch. 2014, 111, 2014
182014
Algebraic cryptanalysis and RFID authentication
C Cid, L Ferreira, G Procter, MJB Robshaw
International Workshop on Radio Frequency Identification: Security and …, 2015
32015
The design and analysis of symmetric cryptosystems
G Procter
Royal Holloway, University of London, 2015
12015
The system can't perform the operation now. Try again later.
Articles 1–6