Author of the publication

A Key-Recovery Attack on 855-round Trivium.

, , , and . CRYPTO (2), volume 10992 of Lecture Notes in Computer Science, page 160-184. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128., , , and . IACR Cryptology ePrint Archive, (2020)Coefficient Grouping: Breaking Chaghri and More., , , , and . IACR Cryptol. ePrint Arch., (2022)Algebraic Attacks on Round-Reduced Keccak/Xoodoo., , , and . IACR Cryptol. ePrint Arch., (2020)Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff., , , , and . Comput. J., 64 (4): 628-638 (2021)Algebraic Attacks on RAIN and AIM Using Equivalent Representations., , , and . IACR Trans. Symmetric Cryptol., 2023 (4): 166-186 (2023)Weak Keys in Reduced AEGIS and Tiaoxin., , , and . IACR Trans. Symmetric Cryptol., 2021 (2): 104-139 (2021)Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions., , , and . IACR Trans. Symmetric Cryptol., 2024 (1): 214-233 (2024)Modeling for Three-Subset Division Property without Unknown Subset., , , , and . IACR Cryptology ePrint Archive, (2020)Differential and invertibility properties of BLAKE (full version)., , , , and . IACR Cryptology ePrint Archive, (2010)Fast Correlation Attacks: Methods and Countermeasures.. FSE, volume 6733 of Lecture Notes in Computer Science, page 55-67. Springer, (2011)