Author of the publication

Related-Key Differential Attack on Round Reduced RECTANGLE-80.

, , , , and . IACR Cryptology ePrint Archive, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher., , , and . IACR Cryptology ePrint Archive, (2016)Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS., , , , and . IACR Cryptology ePrint Archive, (2019)Related-Key Impossible Differential Analysis of Full Khudra., , , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 135-146. Springer, (2016)Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem., , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 45-57. Springer, (2012)Lightweight Iterative MDS Matrices: How Small Can We Go?, , , , and . IACR Trans. Symmetric Cryptol., 2019 (4): 147-170 (2019)Fabrication of UTC-PDs Integrated with THz Antenna., , , and . ComComAP, page 40-43. IEEE, (2019)Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions., , , , , , and . IACR Cryptol. ePrint Arch., (2020)Fail-safe Watchtowers and Short-lived Assertions for Payment Channels., , and . AsiaCCS, page 506-518. ACM, (2020)Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON., , , , , , , , and . IACR Cryptol. ePrint Arch., (2015)Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques., , and . ICISSP, page 74-84. SciTePress, (2016)