Author of the publication

Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess Approach.

, , , , and . IACR Trans. Symmetric Cryptol., 2023 (3): 74-100 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reduce SW/HW Migration Efforts by a RTOS in Multi-FPGA Systems., , , , and . CSCWD (Selected papers), volume 3865 of Lecture Notes in Computer Science, page 636-645. Springer, (2005)Efficient and Fine-Grained Signature for IIoT With Resistance to Key Exposure., , and . IEEE Internet Things J., 8 (11): 9189-9205 (2021)Software Tamper Resistance Based on White-Box SMS4 Implementation., , , and . iSCI, volume 1122 of Communications in Computer and Information Science, page 486-495. Springer, (2019)Converting normal DLP-based signatures into blind.. Appl. Math. Comput., 170 (1): 657-665 (2005)P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Feature Norm Regularized Federated Learning: Transforming Skewed Distributions into Global Insights., , and . CoRR, (2023)Protecting lightweight block cipher implementation in mobile big data computing - A GPU-based approach., , , , , and . Peer-to-Peer Netw. Appl., 11 (2): 252-264 (2018)Fast on-line real-time scheduling algorithm for reconfigurable computing., , , and . CSCWD (2), page 793-798. IEEE Computer Society, (2005)1-84600-002-5.Scale Invariant Domain Generalization Image Recapture Detection., , , , and . ICONIP (4), volume 13111 of Lecture Notes in Computer Science, page 75-86. Springer, (2021)An Operating System Framework for Reconfigurable Systems., , and . CIT, page 788-792. IEEE Computer Society, (2005)