Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A class of quadratic APN binomials inequivalent to power functions., , and . IACR Cryptology ePrint Archive, (2006)Practical Key Recovery Attacks On Two McEliece Variants., and . IACR Cryptology ePrint Archive, (2009)Cryptographer's Toolkit for Construction of 8-Bit Bent Functions., and . IACR Cryptology ePrint Archive, (2005)Shorter Linear Straight-Line Programs for MDS Matrices., , , and . IACR Trans. Symmetric Cryptol., 2017 (4): 188-211 (2017)Two Classes of Quadratic APN Binomials Inequivalent to Power Functions., , and . IEEE Trans. Inf. Theory, 54 (9): 4218-4229 (2008)A new construction of highly nonlinear S-boxes., and . Cryptogr. Commun., 4 (1): 65-77 (2012)Secure Computation of the Mean and Related Statistics., , and . TCC, volume 3378 of Lecture Notes in Computer Science, page 283-302. Springer, (2005)An infinite class of quadratic APN functions which are not equivalent to power mappings., , , and . ISIT, page 2637-2641. IEEE, (2006)On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes., , , , , , and . CRYPTO, volume 3621 of Lecture Notes in Computer Science, page 327-343. Springer, (2005)Linearly Self-Equivalent APN Permutations in Small Dimension., , and . IEEE Trans. Inf. Theory, 67 (7): 4863-4875 (2021)