Author of the publication

Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version).

, , , , and . IACR Cryptol. ePrint Arch., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Several MILP-Aided Attacks Against SNOW 2.0., , , and . CANS, volume 11124 of Lecture Notes in Computer Science, page 394-413. Springer, (2018)ACE in Chains : How Risky is CBC Encryption of Binary Executable Files ?, , and . IACR Cryptol. ePrint Arch., (2020)Cryptanalysis of Reduced Kreyvium., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (9): 1548-1556 (2018)Offshore-Wind-Farm Configuration Using Diode Rectifier With MERS in Current Link Topology., , , and . IEEE Trans. Ind. Electron., 60 (7): 2930-2937 (2013)Exploring the optimality of byte-wise permutations of a piccolo-type block cipher., , , and . Inf. Process. Lett., (February 2024)Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend., , and . J. Inf. Process., (2023)Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (11): 1260-1273 (2020)Generic Key Recovery Attack on Feistel Scheme., and . IACR Cryptology ePrint Archive, (2015)Design Strategy of Z-source Inverter for Utilization of Power Semiconductors with Extremely Low Short-circuit Capability., , , , , and . IECON, page 4997-5002. IEEE, (2019)Novel dead time controlled gate driver using the current sensor of SiC-MOSFET., , , , , and . IECON, page 1651-1656. IEEE, (2015)