Author of the publication

On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet.

, , and . SAC, volume 11959 of Lecture Notes in Computer Science, page 365-392. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Use of GF-Inversion as a Cryptographic Primitive., and . Selected Areas in Cryptography, volume 3006 of Lecture Notes in Computer Science, page 234-247. Springer, (2003)Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes., and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 467-484. Springer, (2016)On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers., and . IWSEC, volume 10418 of Lecture Notes in Computer Science, page 3-18. Springer, (2017)Preimage Attacks on 3, 4, and 5-Pass HAVAL., and . ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, page 253-271. Springer, (2008)Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 96-A (1): 141-149 (2013)A Cyclic Window Algorithm for Elliptic Curves over OEF., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (1): 121-128 (2003)Forward-Secure Authenticated-Encryption in Multi-Receiver Setting., , , and . SECRYPT, page 141-148. INSTICC Press, (2006)Practical Password Recovery on an MD5 Challenge and Response., , and . IACR Cryptology ePrint Archive, (2007)Linear Cryptanalysis of the Fast Data Encipherment Algorithm., and . CRYPTO, volume 839 of Lecture Notes in Computer Science, page 12-16. Springer, (1994)The Security and Performance of "GCM" when Short Multiplications Are Used Instead., and . Inscrypt, volume 7763 of Lecture Notes in Computer Science, page 225-245. Springer, (2012)