Author of the publication

Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256.

, and . IACR Cryptology ePrint Archive, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing the Weight of a Boolean Function from Its Algebraic Normal Form., and . SETA, volume 7280 of Lecture Notes in Computer Science, page 89-100. Springer, (2012)The Multiplicative Complexity of 6-variable Boolean Functions., , and . IACR Cryptol. ePrint Arch., (2018)On Feedback Functions of Maximum Length Nonlinear Feedback Shift Registers., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (6): 1226-1231 (2010)Boolean functions with multiplicative complexity 3 and 4., , and . Cryptogr. Commun., 12 (5): 935-946 (2020)Counting Boolean functions with specified values in their Walsh spectrum., , and . J. Comput. Appl. Math., (2014)Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256., and . LATINCRYPT, volume 6212 of Lecture Notes in Computer Science, page 205-221. Springer, (2010)Searching for Best Karatsuba Recurrences., , , and . SEA², volume 11544 of Lecture Notes in Computer Science, page 332-342. Springer, (2019)New Distinguishers Based on Random Mappings against Stream Ciphers., , , and . SETA, volume 5203 of Lecture Notes in Computer Science, page 30-41. Springer, (2008)Nonlinearity Computation for Sparse Boolean Functions. CoRR, (2013)The multiplicative complexity of 6-variable Boolean functions., , and . Cryptogr. Commun., 11 (1): 93-107 (2019)