Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function., , , , and . IACR Cryptology ePrint Archive, (2014)Diverse Memory for Experience Replay in Continual Learning., and . ESANN, (2022)Compression Optimality of Asymmetric Numeral Systems., , , , , and . CoRR, (2022)The Compression Optimality of Asymmetric Numeral Systems., , , , , and . Entropy, 25 (4): 672 (April 2023)Efficient Method of Input Variable Partitioning in Functional Decomposition Based on Evolutionary Algorithms., , and . DSD, page 136-143. IEEE Computer Society, (2004)Differential-linear and Impossible Differential Cryptanalysis of Round-reduced Scream., , and . SECRYPT, page 501-506. SciTePress, (2017)ANS-based Compression and Encryption with 128-bit Security., , , , , , and . IACR Cryptol. ePrint Arch., (2021)A SAT-based preimage analysis of reduced KECCAK hash functions., and . IACR Cryptology ePrint Archive, (2010)Rotational cryptanalysis of round-reduced Keccak., , and . IACR Cryptology ePrint Archive, (2012)Applications of Key Recovery Cube-attack-like., , , and . IACR Cryptology ePrint Archive, (2015)