Author of the publication

Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit.

, , , , and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 248-260. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Pairing Problem with User Interaction., and . SEC, volume 181 of IFIP, page 251-266. Springer, (2005)On Hiding a Plaintext Length by Preencryption., and . ACNS, volume 6715 of Lecture Notes in Computer Science, page 345-358. (2011)Expected loss analysis of thresholded authentication protocols in noisy conditions, , and . CoRR, (2010)On Tamper-Resistance from a Theoretical Viewpoint., and . CHES, volume 5747 of Lecture Notes in Computer Science, page 411-428. Springer, (2009)Misuse Attacks on Post-Quantum Cryptosystems., , , , and . IACR Cryptology ePrint Archive, (2019)On-Demand Ratcheting with Security Awareness., , and . IACR Cryptology ePrint Archive, (2019)Swap and Rotate: Lightweight linear layers for SPN-based blockciphers., , , and . IACR Cryptology ePrint Archive, (2019)On selection of samples in algebraic attacks and a new technique to find hidden low degree equations., , , and . Int. J. Inf. Sec., 15 (1): 51-65 (2016)Tornado Attack on RC4 with Applications to WEP & WPA., , , and . IACR Cryptology ePrint Archive, (2015)Breaking the IOC Authenticated Encryption Mode., , and . AFRICACRYPT, volume 8469 of Lecture Notes in Computer Science, page 126-135. Springer, (2014)