Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160., , , , and . Des. Codes Cryptogr., 88 (5): 887-930 (2020)EliMAC: Speeding Up LightMAC by around 20%., , and . IACR Trans. Symmetric Cryptol., 2023 (2): 69-93 (2023)New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160., , , , , and . IACR Trans. Symmetric Cryptol., 2019 (3): 169-192 (2019)Cryptanalysis of Simpira., , and . IACR Cryptology ePrint Archive, (2016)Analysis of the Kupyna-256 Hash Function., , and . IACR Cryptology ePrint Archive, (2015)Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC., and . CT-RSA, volume 10159 of Lecture Notes in Computer Science, page 207-222. Springer, (2017)Exploring the Golden Mean Between Leakage and Fault Resilience and Practice., , and . IACR Cryptology ePrint Archive, (2020)Differential Cryptanalysis of SipHash., , and . Selected Areas in Cryptography, volume 8781 of Lecture Notes in Computer Science, page 165-182. Springer, (2014)Ascon hardware implementations and side-channel evaluation., , , and . Microprocess. Microsystems, (2017)Leakage Resilience of the Duplex Construction., and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 225-255. Springer, (2019)