Author of the publication

Truncated Differential Attacks on Contracting Feistel Ciphers.

, and . IACR Trans. Symmetric Cryptol., 2022 (2): 141-160 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integral Cryptanalysis Using Algebraic Transition Matrices., and . IACR Trans. Symmetric Cryptol., 2023 (4): 244-269 (2023)Truncated Differential Attacks on Contracting Feistel Ciphers., and . IACR Trans. Symmetric Cryptol., 2022 (2): 141-160 (2022)Block Cipher Invariants as Eigenvectors of Correlation Matrices.. J. Cryptol., 33 (3): 1156-1183 (2020)Multi-user Security of the Elephant v2 Authenticated Encryption Mode., , , and . SAC, volume 13203 of Lecture Notes in Computer Science, page 155-178. Springer, (2021)Differential Cryptanalysis in the Fixed-Key Model., and . CRYPTO (3), volume 13509 of Lecture Notes in Computer Science, page 687-716. Springer, (2022)Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems., , , , , , , , , and 1 other author(s). CRYPTO (3), volume 12172 of Lecture Notes in Computer Science, page 299-328. Springer, (2020)Cryptanalysis of the Legendre PRF and generalizations., , , and . IACR Cryptology ePrint Archive, (2019)Cryptanalysis of the MALICIOUS Framework., and . IACR Cryptol. ePrint Arch., (2020)Revisiting the Wrong-Key-Randomization Hypothesis., , and . J. Cryptol., 33 (2): 567-594 (2020)An overview of the Eight International Olympiad in Cryptography "Non-Stop University CRYPTO"., , , , , , , , , and 6 other author(s). CoRR, (2022)