Author of the publication

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.

, , , , , , and . IEEE Trans. Computers, 68 (10): 1470-1486 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cube-Based Cryptanalysis of Subterranean-SAE., , and . IACR Trans. Symmetric Cryptol., 2019 (4): 192-222 (2019)Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods., , and . IACR Cryptology ePrint Archive, (2019)Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers., and . IACR Cryptology ePrint Archive, (2015)All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach., and . Selected Areas in Cryptography, volume 7707 of Lecture Notes in Computer Science, page 202-221. Springer, (2012)Cryptanalysis of the Full Spritz Stream Cipher., and . FSE, volume 9783 of Lecture Notes in Computer Science, page 63-77. Springer, (2016)Current Control of Modular Multilevel Converters Using a Daisy-Chained Distributed Control System with Communication Path Redundancy., and . IECON, page 6108-6113. IEEE, (2019)Conditional Differential Cryptanalysis for Kreyvium., , and . ACISP (1), volume 10342 of Lecture Notes in Computer Science, page 421-434. Springer, (2017)Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI., , and . IWSEC, volume 7631 of Lecture Notes in Computer Science, page 138-155. Springer, (2012)More Results on Shortest Linear Programs., , and . IWSEC, volume 11689 of Lecture Notes in Computer Science, page 109-128. Springer, (2019)Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi., , , , and . J. Inf. Secur. Appl., (2022)