Author of the publication

How to Construct Universal One-Way Hash Functions of Order r.

, , , and . INDOCRYPT, volume 3797 of Lecture Notes in Computer Science, page 63-76. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preimage Attack on ARIRANG., , and . IACR Cryptology ePrint Archive, (2009)HIGHT: A New Block Cipher Suitable for Low-Resource Device., , , , , , , , , and 3 other author(s). CHES, volume 4249 of Lecture Notes in Computer Science, page 46-59. Springer, (2006)Impossible Differential Cryptanalysis of Zodiac., , , , and . FSE, volume 2355 of Lecture Notes in Computer Science, page 300-311. Springer, (2001)LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors., , , , , and . WISA, volume 8267 of Lecture Notes in Computer Science, page 3-27. Springer, (2013)New Preimage Attack on MDC-4., and . IACR Cryptology ePrint Archive, (2012)Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia., , , and . ACISP, volume 7372 of Lecture Notes in Computer Science, page 87-100. Springer, (2012)Related-Key Attack on the Full HIGHT., , and . ICISC, volume 6829 of Lecture Notes in Computer Science, page 49-67. Springer, (2010)Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash., , , and . ICISC, volume 5984 of Lecture Notes in Computer Science, page 315-331. Springer, (2009)Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers., , , , , , and . J. Cryptol., 19 (4): 441-462 (2006)Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property., , , , and . MMM-ACNS, volume 2776 of Lecture Notes in Computer Science, page 298-307. Springer, (2003)