Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005., , , and . EUC Workshops, volume 4097 of Lecture Notes in Computer Science, page 262-270. Springer, (2006)Improved Impossible Differential Attacks on Large-Block Rijndael., , , , and . ISC, volume 5222 of Lecture Notes in Computer Science, page 298-315. Springer, (2008)A New Class of Single Cycle T-Functions., , , and . FSE, volume 3557 of Lecture Notes in Computer Science, page 68-82. Springer, (2005)Probabilistic Analysis for the Relationship Between Min-Entropy and Guessing Attack., , and . CSA/CUTE, volume 421 of Lecture Notes in Electrical Engineering, page 567-572. Springer, (2016)On the Security of CAMELLIA against the Square Attack., , and . FSE, volume 2365 of Lecture Notes in Computer Science, page 89-99. Springer, (2002)Accelerated implementation for testing IID assumption of NIST SP 800-90B using GPU., and . PeerJ Comput. Sci., (2021)IPCC7: Post-Quantum Encryption Scheme Based on a Perfect Dominating Set in 3-Regular Graph., , , , and . IEEE Access, (2024)High-Speed Implementations of Block Cipher ARIA Using Graphics Processing Units., , and . MUE, page 271-275. IEEE Computer Society, (2008)Related-Key Boomerang Attack on Block Cipher SQUARE., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (1): 3-9 (2011)Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003., , and . Public Key Cryptography, volume 4450 of Lecture Notes in Computer Science, page 107-117. Springer, (2007)