Author of the publication

Improved Zero-Correlation Cryptanalysis on SIMON.

, , and . Inscrypt, volume 9589 of Lecture Notes in Computer Science, page 125-143. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds., , , , and . IACR Cryptology ePrint Archive, (2015)Differential Cryptanalysis of Reduced-Round PRESENT.. AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, page 40-49. Springer, (2008)MILP-aided bit-based division property for primitives with non-bit-permutation linear layers., , and . IET Inf. Secur., 14 (1): 12-20 (2020)On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers., , , and . IACR Trans. Symmetric Cryptol., 2020 (3): 262-287 (2020)Universal Forgery Attack against GCM-RUP., , , , , and . IACR Cryptology ePrint Archive, (2019)A column generation tailored to electric vehicle routing problem with nonlinear battery depreciation., , and . Comput. Oper. Res., (2022)Full Round Distinguishing and Key-Recovery Attacks on SAND-2 (Full version)., , , and . IACR Cryptol. ePrint Arch., (2023)An STP-based model toward designing S-boxes with good cryptographic properties., , , , and . Des. Codes Cryptogr., 90 (5): 1179-1202 (2022)SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations., , , , , , , , and . Des. Codes Cryptogr., 90 (1): 155-198 (2022)Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128., , , and . IACR Cryptol. ePrint Arch., (2021)