Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Alzette: A 64-bit ARX-box., , , , , , , and . IACR Cryptology ePrint Archive, (2019)Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key., , and . IACR Cryptology ePrint Archive, (2014)Block Ciphers and Stream Ciphers: The State of the Art.. IACR Cryptology ePrint Archive, (2004)Ciphertext-Only Attack.. Encyclopedia of Cryptography and Security, Springer, (2005)Miss-in-the-Middle Attack.. Encyclopedia of Cryptography and Security, Springer, (2005)IDEA.. Encyclopedia of Cryptography and Security, Springer, (2005)Chosen Ciphertext Attack.. Encyclopedia of Cryptography and Security, Springer, (2005)Product Cipher, Superencryption.. Encyclopedia of Cryptography and Security, Springer, (2005)Skipjack.. Encyclopedia of Cryptography and Security, Springer, (2005)Boomerang Attack.. Encyclopedia of Cryptography and Security, Springer, (2005)