Author of the publication

Algebraic Precomputations in Differential and Integral Cryptanalysis.

, , , , and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 387-403. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Analysis of the XSL Algorithm., and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 333-352. Springer, (2005)Recent developments in cryptographic hash functions: Security implications and future directions.. Inf. Secur. Tech. Rep., 11 (2): 100-107 (2006)On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes., and . J. Cryptol., 28 (4): 769-795 (2015)Cryptanalysis of three matrix-based key establishment protocols., , and . IACR Cryptology ePrint Archive, (2011)An Analysis of the Hermes8 Stream Ciphers., , , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 1-10. Springer, (2007)Algebraic Precomputations in Differential and Integral Cryptanalysis., , , , and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 387-403. Springer, (2010)Memory Access Pattern Protection for Resource-Constrained Devices., , , and . CARDIS, volume 7771 of Lecture Notes in Computer Science, page 188-202. Springer, (2012)FASTA â€" a stream cipher for fast FHE evaluation., , and . IACR Cryptol. ePrint Arch., (2021)Nonlinear Equivalence of Stream Ciphers., and . FSE, volume 6147 of Lecture Notes in Computer Science, page 40-54. Springer, (2010)Block Ciphers: Algebraic Cryptanalysis and Gröbner Bases., and . Gröbner Bases, Coding, and Cryptography, Springer, (2009)