Author of the publication

Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure.

, , , , , , , , and . IWSEC, volume 11689 of Lecture Notes in Computer Science, page 129-145. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher., , , and . IEEE Trans. Inf. Theory, 53 (9): 3250-3255 (2007)Results of Linear Cryptanalysis Using Linear Sieve Methods., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (5): 1347-1355 (2009)Impossible Differential Cryptanalysis of CLEFIA., , , , , and . FSE, volume 5086 of Lecture Notes in Computer Science, page 398-411. Springer, (2008)Design of a Linear Layer for a Block Cipher Based on Type-2 Generalized Feistel Network with 32 Branches., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 105-A (3): 278-288 (2022)WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher., , , , , , , , and . SAC, volume 12804 of Lecture Notes in Computer Science, page 535-564. Springer, (2020)Parallel Verification of Serial MAC and AE Modes., , , , and . SAC, volume 13203 of Lecture Notes in Computer Science, page 200-219. Springer, (2021)Shorter bit sequence is enough to break stream cipher LILI-128., , , , and . IEEE Trans. Inf. Theory, 51 (12): 4312-4319 (2005)Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher., , , and . IEEE Trans. Inf. Theory, 53 (11): 4377-4383 (2007)Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box., , , and . ICICS, volume 5308 of Lecture Notes in Computer Science, page 128-140. Springer, (2008)Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure., , , , , , , , and . IWSEC, volume 11689 of Lecture Notes in Computer Science, page 129-145. Springer, (2019)