Author of the publication

An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8X.

, and . Selected Areas in Cryptography, volume 8781 of Lecture Notes in Computer Science, page 59-76. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bug Attacks., , and . CRYPTO, volume 5157 of Lecture Notes in Computer Science, page 221-240. Springer, (2008)Bug Attacks., , and . J. Cryptol., 29 (4): 775-805 (2016)An Improvement of Linear Cryptanalysis with Addition Operations with Applications to FEAL-8X., and . Selected Areas in Cryptography, volume 8781 of Lecture Notes in Computer Science, page 59-76. Springer, (2014)Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys., , , , , and . IACR Cryptology ePrint Archive, (2013)Efficient Reconstruction of RC4 Keys from Internal States., and . FSE, volume 5086 of Lecture Notes in Computer Science, page 270-288. Springer, (2008)On bugs and ciphers: new techniques in cryptanalysis.. Technion - Israel Institute of Technology, Israel, (2015)