Author of the publication

A Key-Recovery Attack on 855-round Trivium.

, , , and . CRYPTO (2), volume 10992 of Lecture Notes in Computer Science, page 160-184. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Correlation Properties of Combiners with Memory in Stream Ciphers., and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 204-213. Springer, (1990)Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD., , , , and . EUROCRYPT (1), volume 12105 of Lecture Notes in Computer Science, page 466-495. Springer, (2020)First demonstration of a post-quantum key-exchange with a nanosatellite., , , , , and . CoRR, (2022)A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASH., , , , and . SAC, volume 14201 of Lecture Notes in Computer Science, page 22-42. Springer, (2023)Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations., , , and . ASIACRYPT (1), volume 13090 of Lecture Notes in Computer Science, page 214-240. Springer, (2021)Algebraic Meet-in-the-Middle Attack on LowMC., , , , and . ASIACRYPT (1), volume 13791 of Lecture Notes in Computer Science, page 225-255. Springer, (2022)Coefficient Grouping: Breaking Chaghri and More., , , , and . IACR Cryptol. ePrint Arch., (2022)Algebraic Attacks on Round-Reduced Keccak/Xoodoo., , , and . IACR Cryptol. ePrint Arch., (2020)Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions., , , and . IACR Trans. Symmetric Cryptol., 2024 (1): 214-233 (2024)Algebraic Attacks on RAIN and AIM Using Equivalent Representations., , , and . IACR Trans. Symmetric Cryptol., 2023 (4): 166-186 (2023)