Author of the publication

Linear Cryptanalysis of Non Binary Ciphers.

, , and . Selected Areas in Cryptography, volume 4876 of Lecture Notes in Computer Science, page 184-211. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of an E0-like Combiner with Memory., and . J. Cryptol., 21 (3): 430-457 (2008)How to Sequentialize Independent Parallel Attacks?, and . IACR Cryptology ePrint Archive, (2016)Practical & Provably Secure Distance-Bounding., , and . IACR Cryptology ePrint Archive, (2013)Generic Round-Function Recovery for Feistel Networks over Small Domains., and . IACR Cryptology ePrint Archive, (2018)Optimization of LPN Solving Algorithms., and . IACR Cryptology ePrint Archive, (2016)Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges., and . ProvSec, volume 8209 of Lecture Notes in Computer Science, page 121-138. Springer, (2013)Private Message Franking with After Opening Privacy., and . IACR Cryptology ePrint Archive, (2018)Optimization of the MOVA Undeniable Signature Scheme., , and . Mycrypt, volume 3715 of Lecture Notes in Computer Science, page 196-209. Springer, (2005)An Experiment on DES Statistical Cryptanalysis.. ACM Conference on Computer and Communications Security, page 139-147. ACM, (1996)Cryptanalysis of a homomorphic encryption scheme., , and . Cryptogr. Commun., 10 (1): 27-39 (2018)