Author of the publication

Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC.

, , , , , , , and . Comput. J., 62 (12): 1761-1776 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Development Process Monitoring Based on Nominal Transformation., , and . ACIS-ICIS, page 983-988. IEEE Computer Society, (2009)Assembling metal oxide nanocrystals into dense, hollow, porous nanoparticles for lithium-ion and lithium-oxygen battery application, , , , , and . Nanoscale, 5 (21): 10390-10396 (2013)Deep Reinforcement Learning Based Intelligent Reflecting Surface Optimization for TDD MultiUser MIMO Systems., , , , and . CoRR, (2023)Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256., , , , , and . Comput. J., 63 (12): 1859-1870 (2020)New Analysis of Reduced-Version of Piccolo in the Single-Key Scenario., , , , , , and . KSII Trans. Internet Inf. Syst., 13 (9): 4727-4741 (2019)Improved impossible differential cryptanalysis of large-block Rijndael., , , , , , , and . Sci. China Inf. Sci., 62 (3): 32101:1-32101:14 (2019)Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC., , , , , , , and . Comput. J., 62 (12): 1761-1776 (2019)Improved Cryptanalysis of Reduced-Version QARMA-64/128., , , , , and . IEEE Access, (2020)Multi-Tier Security Feature Modeling for Service-Oriented Application Integration., , and . ACIS-ICIS, page 1178-1183. IEEE Computer Society, (2009)