Author of the publication

Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC.

, , , , , , , and . Comput. J., 62 (12): 1761-1776 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification of novel PI3Kδ inhibitors by docking, ADMET prediction and molecular dynamics simulations., , , , , and . Comput. Biol. Chem., (2019)Identification of novel PPARα/γ dual agonists by pharmacophore screening, docking analysis, ADMET prediction and molecular dynamics simulations., , , , , , and . Comput. Biol. Chem., (2019)Improved Impossible Differential Attack on Reduced Version of Camellia-192/256., , , and . IACR Cryptology ePrint Archive, (2012)Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256., , , , and . IACR Cryptology ePrint Archive, (2011)Path optimization algorithm for agents based on artificial immune and emotional learning., , , and . ICCA, page 247-251. IEEE, (2010)Ciphertext-only fault analysis of GIFT lightweight cryptosystem., , , , , , , , and . Sci. China Inf. Sci., (2022)Configuration Design and Gait Analysis of Wheel-Legged Mobile Robot Based on the Rubik's Cube Mechanism., , , , , , and . IEEE Access, (2022)Two heuristics for the capacitated multi-period cutting stock problem with pattern setup cost., , and . Comput. Oper. Res., (2019)Efficient and Secure Certificateless Proxy Re-Encryption., , and . KSII Trans. Internet Inf. Syst., 11 (4): 2254-2275 (2017)Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things., , , , , , and . KSII Trans. Internet Inf. Syst., 9 (2): 793-810 (2015)