Author of the publication

Leakage Resilience of the Duplex Construction.

, and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 225-255. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of the Kupyna-256 Hash Function., , and . IACR Cryptology ePrint Archive, (2015)Cryptanalysis of Simpira., , and . IACR Cryptology ePrint Archive, (2016)Exploring the Golden Mean Between Leakage and Fault Resilience and Practice., , and . IACR Cryptology ePrint Archive, (2020)Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC., and . CT-RSA, volume 10159 of Lecture Notes in Computer Science, page 207-222. Springer, (2017)Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160., , , , and . Des. Codes Cryptogr., 88 (5): 887-930 (2020)EliMAC: Speeding Up LightMAC by around 20%., , and . IACR Trans. Symmetric Cryptol., 2023 (2): 69-93 (2023)New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160., , , , , and . IACR Trans. Symmetric Cryptol., 2019 (3): 169-192 (2019)Differential Cryptanalysis of SipHash., , and . Selected Areas in Cryptography, volume 8781 of Lecture Notes in Computer Science, page 165-182. Springer, (2014)Exploiting Ineffective Fault Inductions on Symmetric Cryptography., , , , , and . IACR Cryptology ePrint Archive, (2018)Key Recovery for MANTIS-5., , and . IACR Cryptology ePrint Archive, (2016)