Author of the publication

Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers.

, , , , and . IACR Cryptol. ePrint Arch., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two Generic Methods of Analyzing Stream Ciphers., , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 379-396. Springer, (2015)On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes., , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 374-385. Springer, (2005)Constructing differentially 4-uniform permutations over GF(22m ) from quadratic APN permutations over GF(22m+1)., and . Des. Codes Cryptogr., 72 (2): 249-264 (2014)Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version)., , , , and . IACR Cryptol. ePrint Arch., (2020)A new method for Searching Optimal Differential and Linear Trails in ARX Ciphers., , , and . IACR Cryptol. ePrint Arch., (2019)Automatical Method for Searching Integrals of ARX Block Cipher with Division Property Using Three Subsets., , and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 647-663. Springer, (2018)A Flaw in The Internal State Recovery Attack on ALPHA-MAC., , and . IACR Cryptology ePrint Archive, (2010)A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure., and . IACR Cryptology ePrint Archive, (2009)Notes on factor prime factorizations for n-D polynomial matrices., and . Multidimens. Syst. Signal Process., 21 (1): 87 (2010)New Genetic Operators for Developing S-Boxes With Low Boomerang Uniformity., and . IEEE Access, (2022)