Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perfect Algebraic Immune Functions., , and . ASIACRYPT, volume 7658 of Lecture Notes in Computer Science, page 172-189. Springer, (2012)Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks., and . Inf. Sci., (2017)Practical Collision Attacks against Round-Reduced SHA-3., , , , , and . IACR Cryptology ePrint Archive, (2019)Lightweight MDS Generalized Circulant Matrices., and . FSE, volume 9783 of Lecture Notes in Computer Science, page 101-120. Springer, (2016)On the Resistance of Boolean Functions against Fast Algebraic Attacks., , and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 261-274. Springer, (2011)Comments on Ä design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation"., , and . Cryptogr. Commun., 5 (1): 1-6 (2013)Searching cubes for testing Boolean functions and its application to Trivium., , and . ISIT, page 496-500. IEEE, (2015)Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery., , , and . EUROCRYPT (2), volume 10821 of Lecture Notes in Computer Science, page 715-744. Springer, (2018)Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK., , , and . IWSEC, volume 11049 of Lecture Notes in Computer Science, page 244-261. Springer, (2018)On the immunity of Boolean functions against fast algebraic attacks using bivariate polynomial representation., , and . IACR Cryptology ePrint Archive, (2012)