Author of the publication

Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities.

, , , , and . IACR Cryptology ePrint Archive, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Retracing Boomerang Attack., , , and . IACR Cryptology ePrint Archive, (2019)IoT Goes Nuclear: Creating a Zigbee Chain Reaction., , , and . IEEE Secur. Priv., 16 (1): 54-62 (2018)The Retracing Boomerang Attack., , , and . EUROCRYPT (1), volume 12105 of Lecture Notes in Computer Science, page 280-309. Springer, (2020)Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure., , and . ACM Conference on Computer and Communications Security, page 1397-1414. ACM, (2018)TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation., , and . IACR Cryptol. ePrint Arch., (2022)That's not my signature! Fail-stop signatures for a post-quantum world., , , and . IACR Cryptol. ePrint Arch., (2023)The Gates of Time: Improving Cache Attacks with Transient Execution., , , , and . USENIX Security Symposium, page 1955-1972. USENIX Association, (2023)Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3., , , , and . EUROCRYPT (2), volume 12697 of Lecture Notes in Computer Science, page 127-154. Springer, (2021)IoT Goes Nuclear: Creating a ZigBee Chain Reaction., , , and . IACR Cryptology ePrint Archive, (2016)Pseudorandom Black Swans: Cache Attacks on CTR_DRBG., , , , , , and . IACR Cryptol. ePrint Arch., (2019)