Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Alzette: A 64-bit ARX-box., , , , , , , and . IACR Cryptology ePrint Archive, (2019)Lightweight AEAD and Hashing using the Sparkle Permutation Family., , , , , , , and . IACR Trans. Symmetric Cryptol., 2020 (S1): 208-261 (2020)Meet-in-the-Filter and Dynamic Counting with Applications to Speck., , , , and . IACR Cryptol. ePrint Arch., (2022)On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study., , , , , and . CT-RSA, volume 12704 of Lecture Notes in Computer Science, page 657-681. Springer, (2021)Anemoi: Exploiting the Link between Arithmetization-Orientation and CCZ-Equivalence., , , , and . IACR Cryptol. ePrint Arch., (2022)Adaptive license plate image extraction., , , , and . CompSysTech, page 1-7. ACM, (2004)Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak., and . ACNS Workshops, volume 13907 of Lecture Notes in Computer Science, page 43-62. Springer, (2023)Meet-in-the-Filter and Dynamic Counting with Applications to Speck., , , , and . ACNS (1), volume 13905 of Lecture Notes in Computer Science, page 149-177. Springer, (2023)Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX)., , , , , , , and . CRYPTO (3), volume 12172 of Lecture Notes in Computer Science, page 419-448. Springer, (2020)The Last Challenge Attack: Exploiting a Vulnerable Implementation of the Fiat-Shamir Transform in a KZG-based SNARK., , and . IACR Cryptol. ePrint Arch., (2024)