Author of the publication

Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256.

, , and . WEWoRC, volume 4945 of Lecture Notes in Computer Science, page 28-38. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba., , , , and . IACR Cryptology ePrint Archive, (2007)New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba., , , , and . FSE, volume 5086 of Lecture Notes in Computer Science, page 470-488. Springer, (2008)Higher-Order Differentials of Ciphers with Low-Degree S-Boxes., , , , and . IACR Cryptol. ePrint Arch., (2020)Weak Linear Layers in Word-Oriented Partial SPN and HADES-Like Ciphers., , and . IACR Cryptol. ePrint Arch., (2020)Rotational Rebound Attacks on Reduced Skein., , and . ASIACRYPT, volume 6477 of Lecture Notes in Computer Science, page 1-19. Springer, (2010)Second-Preimage Analysis of Reduced SHA-1.. ACISP, volume 6168 of Lecture Notes in Computer Science, page 104-116. Springer, (2010)Practical Attacks on AES-like Cryptographic Hash Functions., and . LATINCRYPT, volume 8895 of Lecture Notes in Computer Science, page 259-273. Springer, (2014)Second Preimages for SMASH., , , and . CT-RSA, volume 4377 of Lecture Notes in Computer Science, page 101-111. Springer, (2007)Efficient FPGA Implementations of LowMC and Picnic., , , , and . IACR Cryptology ePrint Archive, (2019)Analysis of the Hash Function Design Strategy Called SMASH., , , and . IEEE Trans. Inf. Theory, 54 (8): 3647-3655 (2008)