Author of the publication

Cryptanalysis of TWOPRIME.

, , , and . FSE, volume 1372 of Lecture Notes in Computer Science, page 32-48. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Second Preimages on n-Bit Hash Functions for Much Less than 2n Work., and . EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, page 474-490. Springer, (2005)Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator., , and . Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science, page 13-33. Springer, (1999)MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants., and . AES Candidate Conference, page 169-185. National Institute of Standards and Technology,, (2000)Breaking Category Five SPHINCS+ with SHA-256., , and . PQCrypto, volume 13512 of Lecture Notes in Computer Science, page 501-522. Springer, (2022)Design Principles for True Random Number Generators for Security Applications., , , , and . DAC, page 121. ACM, (2019)Cryptographic Support for Secure Logs on Untrusted Machines., and . USENIX Security Symposium, USENIX Association, (1998)Authenticating Secure Tokens Using Slow Memory Access., and . Smartcard, USENIX Association, (1999)Performance Requirements for End-to-End Verifiable Elections., , , and . EVT/WOTE, USENIX Association, (2010)Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs., and . Recent Advances in Intrusion Detection, (1999)Building PRFs from PRPs., , , and . CRYPTO, volume 1462 of Lecture Notes in Computer Science, page 370-389. Springer, (1998)