Author of the publication

Real-Time Related-Key Attack on Full-Round Shadow Designed for IoT Nodes.

, , , , , , and . IEEE Trans. Computers, 73 (2): 613-620 (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MILP-aided Method of Searching Division Property Using Three Subsets and Applications., , , , and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 398-427. Springer, (2019)MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets., , , , and . IACR Cryptol. ePrint Arch., (2018)New method for combining Matsui's bounding conditions with sequential encoding method., , , , , and . Des. Codes Cryptogr., 91 (11): 3603-3642 (November 2023)Exploring Secret Keys in Searching Integral Distinguishers Based on Division Property., , , , and . IACR Trans. Symmetric Cryptol., 2020 (3): 288-304 (2020)A Practical Method to Recover Exact Superpoly in Cube Attack., , , , and . IACR Cryptol. ePrint Arch., (2019)Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework., , , , , , and . Des. Codes Cryptogr., 91 (9): 2845-2878 (September 2023)Practical Attacks on the Full-round FRIET., , , , and . IACR Cryptol. ePrint Arch., (2022)New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers., , , , , , and . IACR Cryptol. ePrint Arch., (2023)Practical Attacks on Full-round FRIET., , , , and . IACR Trans. Symmetric Cryptol., 2022 (4): 105-119 (2022)The autocorrelation properties of single cycle polynomial T-functions., , and . Des. Codes Cryptogr., 86 (7): 1527-1540 (2018)