Author of the publication

A cluster-based practical key recovery attack on reduced-round AES using impossible-differential cryptanalysis.

, , , and . J. Supercomput., 79 (6): 6252-6289 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry., , , and . AFRICACRYPT, volume 8469 of Lecture Notes in Computer Science, page 88-108. Springer, (2014)New Architectural Design of CA-Based Codec., and . IEEE Trans. Very Large Scale Integr. Syst., 18 (7): 1139-1144 (2010)CASTREAM: A High-speed, Secure Stream Cipher Suitable for Both Hardware and Software., and . J. Cell. Autom., 9 (2-3): 153-166 (2014)An Analytical Framework for Characterizing Restricted Two Dimensional Cellular Automata Evolution., , , , and . J. Cell. Autom., 3 (4): 313-335 (2008)Theory of a Class of Complemented Group Cellular Automata and Its Application to Cryptography., and . J. Cell. Autom., 2 (3): 243-271 (2007)CASH: Cellular Automata Based Parameterized Hash., , , and . SPACE, volume 8804 of Lecture Notes in Computer Science, page 59-75. Springer, (2014)New algorithms for batch verification of standard ECDSA signatures., , , , , and . J. Cryptographic Engineering, 4 (4): 237-258 (2014)Hierarchical Verification of Galois Field Circuits., , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 26 (10): 1893-1898 (2007)Customizing Cellular Message Encryption Algorithm., and . Int. J. Netw. Secur., 7 (2): 193-201 (2008)Fault Attack, Countermeasures on Pairing Based Cryptography., , and . Int. J. Netw. Secur., 12 (1): 21-28 (2011)