Author of the publication

On computational complexity of impossible differential cryptanalysis.

, , and . Inf. Process. Lett., 114 (5): 252-255 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impossible Differential Attacks on 13-Round CLEFIA-128., , and . J. Comput. Sci. Technol., 26 (4): 744-750 (2011)Non-isomorphic biclique cryptanalysis of full-round Crypton., , and . Comput. Stand. Interfaces, (2015)On computational complexity of impossible differential cryptanalysis., , and . Inf. Process. Lett., 114 (5): 252-255 (2014)New Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-128., , , and . Selected Areas in Cryptography, volume 5867 of Lecture Notes in Computer Science, page 281-294. Springer, (2009)Cryptanalysis of Block Ciphers Using Almost-Impossible Differentials., , and . IACR Cryptology ePrint Archive, (2010)Cryptanalysis of mCrypton-64., , and . Int. J. Commun. Syst., 28 (8): 1401-1418 (2015)Biclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers., , and . Secur. Commun. Networks, 9 (1): 27-33 (2016)Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton., , and . IACR Cryptology ePrint Archive, (2013)Biclique cryptanalysis of MIBS-80 and PRESENT-80., , and . IACR Cryptology ePrint Archive, (2015)New impossible differential attacks on reduced-round Crypton., , and . Comput. Stand. Interfaces, 32 (4): 222-227 (2010)