Author of the publication

Differential attack on nine rounds of the SEED block cipher.

, , , and . Inf. Process. Lett., 114 (3): 116-123 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EPCBC - A Block Cipher Suitable for Electronic Product Code Encryption., , , and . CANS, volume 7092 of Lecture Notes in Computer Science, page 76-97. Springer, (2011)Comments on Änalysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions"., , , and . IEEE Communications Letters, 17 (8): 1521-1523 (2013)AES Variants Secure against Related-Key Differential and Boomerang Attacks., , , , and . WISTP, volume 6633 of Lecture Notes in Computer Science, page 191-207. Springer, (2011)Cryptanalysis of an iterated halving-based hash function: CRUSH., , , , and . IET Inf. Secur., 3 (4): 129-138 (2009)Security analysis of GCM for communication., , , and . Secur. Commun. Networks, 7 (5): 854-864 (2014)A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers.. ASIAN, volume 5913 of Lecture Notes in Computer Science, page 69-78. Springer, (2009)Time-Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU - (Extended Abstract)., , and . ACNS, volume 9092 of Lecture Notes in Computer Science, page 350-369. Springer, (2015)AVON - A Fast Hash Function for Intel SIMD Architectures., and . SECRYPT, page 482-487. SciTePress, (2013)Parallelizable MAC revisited., , , and . Secur. Commun. Networks, 7 (7): 1115-1127 (2014)Two Dragons - A Family of Fast Word-based Stream Ciphers.. SECRYPT, page 35-44. SciTePress, (2012)