Author of the publication

Differential cryptanalysis of Mod-2/Mod-3 constructions of binary weak PRFs.

, , and . ISIT, page 477-482. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential and invertibility properties of BLAKE (full version)., , , , and . IACR Cryptology ePrint Archive, (2010)Fast Correlation Attacks: Methods and Countermeasures.. FSE, volume 6733 of Lecture Notes in Computer Science, page 55-67. Springer, (2011)The Hash Function Family LAKE., , and . FSE, volume 5086 of Lecture Notes in Computer Science, page 36-53. Springer, (2008)Analysis of Multivariate Hash Functions., and . ICISC, volume 4817 of Lecture Notes in Computer Science, page 309-323. Springer, (2007)Fast Correlation Attacks on Stream Ciphers (Extended Abstract)., and . EUROCRYPT, volume 330 of Lecture Notes in Computer Science, page 301-314. Springer, (1988)Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128., , , and . IACR Cryptology ePrint Archive, (2020)First demonstration of a post-quantum key-exchange with a nanosatellite., , , , , and . CoRR, (2022)A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASH., , , , and . SAC, volume 14201 of Lecture Notes in Computer Science, page 22-42. Springer, (2023)Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations., , , and . ASIACRYPT (1), volume 13090 of Lecture Notes in Computer Science, page 214-240. Springer, (2021)Algebraic Meet-in-the-Middle Attack on LowMC., , , , and . ASIACRYPT (1), volume 13791 of Lecture Notes in Computer Science, page 225-255. Springer, (2022)