Author of the publication

Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff.

, , , , and . IACR Cryptol. ePrint Arch., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical-time Attack on the Full MMB Block Cipher., , , and . IACR Cryptology ePrint Archive, (2010)Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs., , , and . IACR Cryptology ePrint Archive, (2008)New Birthday Attacks on Some MACs Based on Block Ciphers., , , , and . CRYPTO, volume 5677 of Lecture Notes in Computer Science, page 209-230. Springer, (2009)Pseudo-Cryptanalysis of Luffa., , , and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 187-198. Springer, (2010)Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1., , and . ICISC, volume 5984 of Lecture Notes in Computer Science, page 349-361. Springer, (2009)Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule., , , , and . IACR Cryptology ePrint Archive, (2019)New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect., , and . IACR Trans. Symmetric Cryptol., 2019 (3): 121-151 (2019)Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny., , , , and . IACR Trans. Symmetric Cryptol., 2021 (2): 249-291 (2021)Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes., , , and . Sci. China Inf. Sci., (2021)Improved Attacks on Reduced-Round Camellia-128/192/256., , , and . CT-RSA, volume 9048 of Lecture Notes in Computer Science, page 59-83. Springer, (2015)