Author of the publication

Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques.

, , and . IACR Cryptol. ePrint Arch., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coefficient Grouping: Breaking Chaghri and More., , , , and . IACR Cryptol. ePrint Arch., (2022)A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASH., , , , and . SAC, volume 14201 of Lecture Notes in Computer Science, page 22-42. Springer, (2023)Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions., , , and . IACR Trans. Symmetric Cryptol., 2024 (1): 214-233 (2024)Algebraic Attacks on RAIN and AIM Using Equivalent Representations., , , and . IACR Trans. Symmetric Cryptol., 2023 (4): 166-186 (2023)Weak Keys in Reduced AEGIS and Tiaoxin., , , and . IACR Trans. Symmetric Cryptol., 2021 (2): 104-139 (2021)Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff., , , , and . Comput. J., 64 (4): 628-638 (2021)Algebraic Attacks on Round-Reduced Keccak/Xoodoo., , , and . IACR Cryptol. ePrint Arch., (2020)First demonstration of a post-quantum key-exchange with a nanosatellite., , , , , and . CoRR, (2022)Differential and invertibility properties of BLAKE (full version)., , , , and . IACR Cryptology ePrint Archive, (2010)Analysis of Multivariate Hash Functions., and . ICISC, volume 4817 of Lecture Notes in Computer Science, page 309-323. Springer, (2007)