Author of the publication

Catalog and Illustrative Examples of Lightweight Cryptographic Primitives.

, , , and . Security of Ubiquitous Computing Systems, Springer International Publishing, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Construction Method for Keystream Generators., and . IEEE Trans. Inf. Forensics Secur., (2023)Fixed Points of Special Type and Cryptanalysis of Full GOST., and . CANS, 7712, page 86-97. Springer, (2012)Lower data attacks on Advanced Encryption Standard.. IACR Cryptol. ePrint Arch., (2024)Optimal Security Limits of RFID Distance Bounding Protocols., , , and . RFIDSec, volume 6370 of Lecture Notes in Computer Science, page 220-238. Springer, (2010)On Analysis of Lightweight Stream Ciphers with Keyed Update., and . IACR Cryptology ePrint Archive, (2020)Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM., , and . J. Inf. Secur. Appl., (2022)Tradeoff attacks on symmetric ciphers.. IACR Cryptol. ePrint Arch., (2021)New Security Proofs and Complexity Records for Advanced Encryption Standard.. IACR Cryptol. ePrint Arch., (2023)Reflection Cryptanalysis of Some Ciphers.. INDOCRYPT, volume 5365 of Lecture Notes in Computer Science, page 294-307. Springer, (2008)Improved Cryptanalysis of SHAMATA-BC., , and . IACR Cryptology ePrint Archive, (2008)