Author of the publication

Cryptanalysis of PMACx, PMAC2x, and SIVx.

, and . IACR Trans. Symmetric Cryptol., 2017 (2): 162-176 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Breaking Message Integrity of an End-to-End Encryption Scheme of LINE., and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 249-268. Springer, (2018)Generalization and Extension of XEX* Mode., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (2): 517-524 (2009)Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC., , , , and . IET Inf. Secur., 16 (2): 75-85 (2022)Integrity analysis of authenticated encryption based on stream ciphers., , and . Int. J. Inf. Sec., 17 (5): 493-511 (2018)Improving cache attacks by considering cipher structure., , , , and . Int. J. Inf. Sec., 5 (3): 166-176 (2006)Security of Related-Key Differential Attacks on TWINE, Revisited., , , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (1): 212-214 (2020)Practical Integral Distinguishers on SNOW 3G and KCipher-2., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 104-A (11): 1603-1611 (2021)Fast Decryption: a New Feature of Misuse-Resistant AE.. IACR Trans. Symmetric Cryptol., 2020 (3): 87-118 (2020)A smaller and faster variant of RSM., , , and . DATE, page 1-6. European Design and Automation Association, (2014)Parallelizable Authenticated Encryption from Functions.. IACR Cryptology ePrint Archive, (2013)