Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm., and . IEEE Access, (2020)Biclique cryptanalysis of Twine-128., , , and . ISCISC, page 46-51. IEEE, (2016)Improved impossible differential and biclique cryptanalysis of HIGHT., , , , and . Int. J. Commun. Syst., (2018)Zero correlation linear attack on reduced round Piccolo-80., , , and . ISCISC, page 66-71. IEEE, (2016)Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT., , , and . IACR Cryptology ePrint Archive, (2013)Low-Data Complexity Biclique Cryptanalysis of Block Ciphers With Application to Piccolo and HIGHT., , , and . IEEE Trans. Inf. Forensics Secur., 9 (10): 1641-1652 (2014)Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity., , , and . ISeCure, 11 (1): 57-74 (2019)Ciphertext-only attack on d × d Hill in O(d13d)., and . Inf. Process. Lett., (2017)Security analysis of CLEFIA-128., , , and . ISCISC, page 84-88. IEEE, (2014)Integral Cryptanalysis of Round-Reduced Shadow-32 for IoT Nodes., , and . IEEE Internet Things J., 11 (6): 10592-10599 (March 2024)