From post

Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials.

, , , и . IWSEC, том 10418 из Lecture Notes in Computer Science, стр. 141-158. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tight Bounds of Differentially and Linearly Active S-Boxes and Division Property of Lilliput., и . IEEE Trans. Computers, 67 (5): 717-732 (2018)Hybrid Code Lifting on Space-Hard Block Ciphers Application to Yoroi and SPNbox., и . IACR Trans. Symmetric Cryptol., 2022 (3): 368-402 (2022)A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs., , , и . ASIACRYPT (2), том 13792 из Lecture Notes in Computer Science, стр. 585-619. Springer, (2022)Analysis of AES, SKINNY, and Others with Constraint Programming., , , , , , и . IACR Cryptol. ePrint Arch., (2017)New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA., и . IWSEC, том 8231 из Lecture Notes in Computer Science, стр. 99-114. Springer, (2013)Integral Cryptanalysis on Full MISTY1.. CRYPTO (1), том 9215 из Lecture Notes in Computer Science, стр. 413-432. Springer, (2015)How Much Can Complexity of Linear Cryptanalysis Be Reduced?, , , и . ICISC, том 8949 из Lecture Notes in Computer Science, стр. 117-131. Springer, (2014)Upper Bounds for the Security of Several Feistel Networks.. ACISP, том 7959 из Lecture Notes in Computer Science, стр. 302-317. Springer, (2013)Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR., и . SAC, том 13203 из Lecture Notes in Computer Science, стр. 179-199. Springer, (2021)Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1., , , , и . CRYPTO (2), том 10992 из Lecture Notes in Computer Science, стр. 129-159. Springer, (2018)