Author of the publication

Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques.

, , and . ICISSP, page 74-84. SciTePress, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Collision Attacks against Round-Reduced SHA-3., , , , , and . J. Cryptol., 33 (1): 228-270 (2020)CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks., , , , , and . IACR Cryptol. ePrint Arch., (2021)Tighter Security Bound of MIBS Block Cipher against Differential Attack., , , , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 518-525. Springer, (2014)Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher., and . NSS, volume 9408 of Lecture Notes in Computer Science, page 331-344. Springer, (2015)Leakage Detection with Kolmogorov-Smirnov Test., , and . IACR Cryptology ePrint Archive, (2019)Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques., , and . ICISSP, page 74-84. SciTePress, (2016)Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON., , , , , , , , and . IACR Cryptol. ePrint Arch., (2015)Improved linear (hull) cryptanalysis of round-reduced versions of SIMON., , , , , and . Sci. China Inf. Sci., 60 (3): 39101:1-39101:3 (2017)CoTree: A Side-Channel Collision Tool to Push the Limits of Conquerable Space., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (12): 4505-4517 (December 2023)Improved MILP Modeling for Automatic Security Evaluation and Application to FOX., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (1): 72-80 (2015)