Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent., , , , , , and . IACR Cryptol. ePrint Arch., (2021)Differential Meet-In-The-Middle Cryptanalysis., , , , and . IACR Cryptol. ePrint Arch., (2022)Very High Resolution Land Cover Mapping of Urban Areas at Global Scale with Convolutional Neural Networks., , , , , , , , , and . CoRR, (2020)Improved Techniques in Differential Cryptanalysis. (Techniques améliorées en cryptanalyse différentielle).. Sorbonne University, Paris, France, (2023)Differential Meet-In-The-Middle Cryptanalysis., , , , and . CRYPTO (3), volume 14083 of Lecture Notes in Computer Science, page 240-272. Springer, (2023)Plurals and Mereology., and . J. Philos. Log., 50 (3): 415-445 (2021)Super furry animals "it's not the end of the world"., and . SIGGRAPH Electronic Art and Animation Catalog, page 174. ACM, (2002)A Generic Algorithm for Efficient Key Recovery in Differential Attacks - and its Associated Tool., , , , and . EUROCRYPT (1), volume 14651 of Lecture Notes in Computer Science, page 217-248. Springer, (2024)A new ranking function for polynomial selection in the number field sieve., and . 75 Years of Mathematics of Computation, volume 754 of Contemporary Mathematics, American Mathematical Society, (2020)Better Steady than Speedy: Full Break of SPEEDY-7-192., , , and . EUROCRYPT (4), volume 14007 of Lecture Notes in Computer Science, page 36-66. Springer, (2023)