Author of the publication

Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis.

, , , , and . EUROCRYPT (1), volume 9665 of Lecture Notes in Computer Science, page 196-213. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Advanced Ensemble Deep Random Vector Functional Link for Eye-Tracking-based Situation Awareness Recognition., , , , and . SSCI, page 300-307. IEEE, (2022)A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones., , , and . FSE, volume 8424 of Lecture Notes in Computer Science, page 485-501. Springer, (2013)A benchmarking framework for eye-tracking-based vigilance prediction of vessel traffic controllers., , , , and . Eng. Appl. Artif. Intell., (2024)Learning to Recommend via Inverse Optimal Matching., , , and . CoRR, (2018)On Algebraic Property of T-Functions., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (1): 267-269 (2012)Poster: Just-Microsecond Deblurring System on the Mobile Phone., , , , and . EWSN, page 230-231. Junction Publishing, Canada / ACM, (2017)SQUARE attack on block ciphers with low algebraic degree., , , and . Sci. China Inf. Sci., 53 (10): 1988-1995 (2010)Multi-class Cancer Classification of Whole Slide Images Through Transformer and Multiple Instance Learning., , , , , , , , , and 1 other author(s). ISBRA, volume 14248 of Lecture Notes in Computer Science, page 150-164. Springer, (2023)Exploring the Effectiveness of Fully Online Translation Learning During COVID-19., , , and . ICWL/SETE, volume 12511 of Lecture Notes in Computer Science, page 344-356. Springer, (2020)Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing., , , , , and . USENIX Security Symposium, page 4499-4515. USENIX Association, (2023)