Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Complete Addition Law for Montgomery Curves., , , and . ICISC, volume 11975 of Lecture Notes in Computer Science, page 260-277. Springer, (2019)Addition of the ARIA Cipher Suites to Transport Layer Security (TLS)., , , and . RFC, (April 2011)Multiple Linear Cryptanalysis Using Linear Statistics., and . IACR Trans. Symmetric Cryptol., 2019 (4): 369-406 (2019)On the Security of MOR Public Key Cryptosystem., , , , , and . ASIACRYPT, volume 3329 of Lecture Notes in Computer Science, page 387-400. Springer, (2004)Security weakness of a certificate-based proxy signature scheme for IIoT environments., and . Inf. Process. Lett., (January 2024)Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme, , and . Information Processing Letters, (2006)Compact Implementations of ARX-Based Block Ciphers on IoT Processors., , , and . ACM Trans. Embed. Comput. Syst., 17 (3): 60:1-60:16 (2018)Preimage Attack on ARIRANG., , and . IACR Cryptology ePrint Archive, (2009)Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers., , , , and . ICISC, volume 8949 of Lecture Notes in Computer Science, page 132-159. Springer, (2014)Revised Version of Block Cipher CHAM., , , , , , and . ICISC, volume 11975 of Lecture Notes in Computer Science, page 1-19. Springer, (2019)