From post

Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak.

, , и . CRYPTO (2), том 10402 из Lecture Notes in Computer Science, стр. 428-451. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A fuzzy integral-based intuitionistic decision system for evaluation and improvement of suppliers in supply chain management., , и . ICMLC, стр. 782-788. IEEE, (2014)Preimage and Collision Attacks on Reduced Ascon Using Algebraic Strategies., , , и . IACR Cryptol. ePrint Arch., (2023)Security analysis of Subterranean 2.0., , , и . Des. Codes Cryptogr., 89 (8): 1875-1905 (2021)A Hierarchical Siamese Network for Noninvasive Staging of Liver Fibrosis Based on US Image Pairs of the Liver and Spleen., , , , , , и . Sensors, 23 (12): 5450 (2023)Related-Key Differential Attack on Round Reduced RECTANGLE-80., , , , и . IACR Cryptology ePrint Archive, (2014)Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON., , , , , и . IACR Cryptology ePrint Archive, (2014)Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA., , и . ACISP (2), том 9723 из Lecture Notes in Computer Science, стр. 379-394. Springer, (2016)Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT)., , , и . ASIACRYPT (1), том 12491 из Lecture Notes in Computer Science, стр. 567-597. Springer, (2020)Practical Collision Attacks against Round-Reduced SHA-3., , , , , и . IACR Cryptology ePrint Archive, (2019)The Application Research of Concretes Biotechnics Slope., , и . ESIAT (1), стр. 689-692. IEEE Computer Society, (2009)