Author of the publication

Improving impossible-differential attacks against Rijndael-160 and Rijndael-224.

. Des. Codes Cryptogr., 82 (1-2): 117-129 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revisiting LFSMs, , , and . CoRR, (2010)Sosemanuk, a Fast Software-Oriented Stream Cipher., , , , , , , , , and 2 other author(s). The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)A White-Box Encryption Scheme using Physically Unclonable Functions., , and . ICETE (2), page 279-286. ScitePress, (2020)Key establishment and management for WSNs., and . Telecommun. Syst., 50 (2): 113-125 (2012)Some Results on FCSR Automata With Applications to the Security of FCSR-Based Pseudorandom Generators., , and . IEEE Trans. Inf. Theory, 54 (2): 836-840 (2008)The GLUON Family: A Lightweight Hash Function Family Based on FCSRs., , , , and . AFRICACRYPT, volume 7374 of Lecture Notes in Computer Science, page 306-323. Springer, (2012)Improving impossible-differential attacks against Rijndael-160 and Rijndael-224.. Des. Codes Cryptogr., 82 (1-2): 117-129 (2017)Tuple Cryptanalysis: Slicing and Fusing Multisets., and . Mycrypt, volume 10311 of Lecture Notes in Computer Science, page 294-320. Springer, (2016)Oblivious Multi-variate Polynomial Evaluation., and . INDOCRYPT, volume 5922 of Lecture Notes in Computer Science, page 430-442. Springer, (2009)Analysis of Reduced-SHAvite-3-256 v2., , and . FSE, volume 6733 of Lecture Notes in Computer Science, page 68-87. Springer, (2011)