Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems., , , , , and . IACR Cryptology ePrint Archive, (2019)Algebraic Cryptanalysis of Frit., , , and . IACR Cryptology ePrint Archive, (2018)Small MACs from Small Permutations., , , and . IACR Cryptol. ePrint Arch., (2022)Reinforced Concrete: Fast Hash Function for Zero Knowledge Proofs and Verifiable Computation., , , , , , and . IACR Cryptol. ePrint Arch., (2021)Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications., , , , , and . CRYPTO (3), volume 14083 of Lecture Notes in Computer Science, page 573-606. Springer, (2023)Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box., and . INDOCRYPT, volume 12578 of Lecture Notes in Computer Science, page 312-331. Springer, (2020)Higher-Order Differentials of Ciphers with Low-Degree S-Boxes., , , , and . IACR Cryptol. ePrint Arch., (2020)Weak Linear Layers in Word-Oriented Partial SPN and HADES-Like Ciphers., , and . IACR Cryptol. ePrint Arch., (2020)Poseidon: A New Hash Function for Zero-Knowledge Proof Systems., , , , and . USENIX Security Symposium, page 519-535. USENIX Association, (2021)An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC., , , , , , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 477-506. Springer, (2020)