Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rebound Attack on the Full Lane Compression Function., , , , and . ASIACRYPT, volume 5912 of Lecture Notes in Computer Science, page 106-125. Springer, (2009)Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems., , and . ASIACRYPT, volume 6477 of Lecture Notes in Computer Science, page 130-145. Springer, (2010)Hidden Shift Quantum Cryptanalysis and Implications., and . ASIACRYPT (1), volume 11272 of Lecture Notes in Computer Science, page 560-592. Springer, (2018)Sieve-in-the-Middle: Improved MITM Attacks (Full Version)., , and . IACR Cryptology ePrint Archive, (2013)Preface to Volume 2018, Issue 1., and . IACR Trans. Symmetric Cryptol., 2018 (1): 1-4 (2018)Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm., , , , and . CoRR, (2020)Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT., and . EUROCRYPT (1), volume 12105 of Lecture Notes in Computer Science, page 221-249. Springer, (2020)Optimal Merging in Quantum k-xor and k-xor-sum Algorithms., and . EUROCRYPT (2), volume 12106 of Lecture Notes in Computer Science, page 311-340. Springer, (2020)Analysis of Reduced-SHAvite-3-256 v2., , and . FSE, volume 6733 of Lecture Notes in Computer Science, page 68-87. Springer, (2011)Practical Analysis of Reduced-Round Keccak., , and . INDOCRYPT, volume 7107 of Lecture Notes in Computer Science, page 236-254. Springer, (2011)