Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations., and . CT-RSA, volume 12006 of Lecture Notes in Computer Science, page 129-145. Springer, (2020)Key Committing Security of AEZ and More., , , , , , , , , and . IACR Trans. Symmetric Cryptol., 2023 (4): 452-488 (2023)Exploring Formal Methods for Cryptographic Hash Function Implementations.. ACISP, volume 13915 of Lecture Notes in Computer Science, page 177-195. Springer, (2023)T5: Hashing Five Inputs with Three Compression Calls., , , and . IACR Cryptol. ePrint Arch., (2021)A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm., and . IACR Cryptol. ePrint Arch., (2023)A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms., and . CT-RSA, volume 13871 of Lecture Notes in Computer Science, page 3-28. Springer, (2023)Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations., and . IACR Cryptology ePrint Archive, (2019)T₅: Hashing Five Inputs with Three Compression Calls., , , and . ITC, volume 199 of LIPIcs, page 24:1-24:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Revisiting the Extension of Matsui's Algorithm 1 to Linear Hulls: Application to TinyJAMBU., , , and . IACR Trans. Symmetric Cryptol., 2022 (2): 161-200 (2022)An overview of the Eight International Olympiad in Cryptography "Non-Stop University CRYPTO"., , , , , , , , , and 6 other author(s). CoRR, (2022)