Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Merging in Quantum k-xor and k-xor-sum Algorithms., and . EUROCRYPT (2), volume 12106 of Lecture Notes in Computer Science, page 311-340. Springer, (2020)Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm., , , , and . CoRR, (2020)Universal Horn Sentences and the Joint Embedding Property., , and . CoRR, (2021)Reducing the Number of Qubits in Quantum Factoring., , and . IACR Cryptol. ePrint Arch., (2024)Quantum impossible differential attacks: applications to AES and SKINNY., , and . Des. Codes Cryptogr., 92 (3): 723-751 (March 2024)On Quantum Slide Attacks., , and . SAC, volume 11959 of Lecture Notes in Computer Science, page 492-519. Springer, (2019)Cryptanalysis Results on Spook., , , , , and . IACR Cryptology ePrint Archive, (2020)On Quantum Slide Attacks., , and . IACR Cryptology ePrint Archive, (2018)Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography., , , , and . IET Inf. Secur., 17 (2): 171-209 (March 2023)Key Committing Attacks against AES-based AEAD Schemes., , , , and . IACR Trans. Symmetric Cryptol., 2024 (1): 135-157 (2024)