Author of the publication

QCB: Efficient Quantum-Secure Authenticated Encryption.

, , , , , , and . ASIACRYPT (1), volume 13090 of Lecture Notes in Computer Science, page 668-698. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm., , , , and . CoRR, (2020)Optimal Merging in Quantum k-xor and k-xor-sum Algorithms., and . EUROCRYPT (2), volume 12106 of Lecture Notes in Computer Science, page 311-340. Springer, (2020)Universal Horn Sentences and the Joint Embedding Property., , and . CoRR, (2021)Reducing the Number of Qubits in Quantum Factoring., , and . IACR Cryptol. ePrint Arch., (2024)Quantum impossible differential attacks: applications to AES and SKINNY., , and . Des. Codes Cryptogr., 92 (3): 723-751 (March 2024)On Quantum Slide Attacks., , and . SAC, volume 11959 of Lecture Notes in Computer Science, page 492-519. Springer, (2019)Quantum Security Analysis of AES., , and . IACR Trans. Symmetric Cryptol., 2019 (2): 55-93 (2019)Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli., , , , , and . J. Cryptol., 34 (4): 45 (2021)Quantum Security Analysis of CSIDH., and . EUROCRYPT (2), volume 12106 of Lecture Notes in Computer Science, page 493-522. Springer, (2020)Quantum Boomerang Attacks and Some Applications., , and . SAC, volume 13203 of Lecture Notes in Computer Science, page 332-352. Springer, (2021)