Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Motivators of Researchers' Knowledge Sharing and Community Promotion in Online Multi-Background Community., , and . Int. J. Knowl. Manag., 17 (2): 23-49 (2021)Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits., , , , and . IACR Trans. Symmetric Cryptol., 2019 (1): 84-117 (2019)On the Complexity of Impossible Differential Cryptanalysis., , , , and . Secur. Commun. Networks, (2018)On the Kipnis-Shamir Method Solving the MinRank Problem., , , and . IWSEC (Short Papers), page 1-13. Information Processing Society of Japan (IPSJ), (2010)Cube Cryptanalysis of Hitag2 Stream Cipher., , , and . CANS, volume 7092 of Lecture Notes in Computer Science, page 15-25. Springer, (2011)Permission less Block chains and Secure Logging., , and . IEEE ICBC, page 56-60. IEEE, (2019)Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks., , , and . IACR Cryptol. ePrint Arch., (2021)Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR., , , and . NSS, volume 9955 of Lecture Notes in Computer Science, page 398-411. Springer, (2016)Quantum Circuit Implementations of AES with Fewer Qubits., , , , and . ASIACRYPT (2), volume 12492 of Lecture Notes in Computer Science, page 697-726. Springer, (2020)Tighter Security Bound of MIBS Block Cipher against Differential Attack., , , , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 518-525. Springer, (2014)