Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Related-Key Boomerang Attack on Block Cipher SQUARE., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (1): 3-9 (2011)Related-Key Boomerang Attack on Block Cipher SQUARE., , and . IACR Cryptology ePrint Archive, (2010)Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers., , , , and . ICISC, volume 8949 of Lecture Notes in Computer Science, page 132-159. Springer, (2014)Preimage Attack on ARIRANG., , and . IACR Cryptology ePrint Archive, (2009)Converting random bits into random numbers., , and . J. Supercomput., 70 (1): 236-246 (2014)Revised Version of Block Cipher CHAM., , , , , , and . ICISC, volume 11975 of Lecture Notes in Computer Science, page 1-19. Springer, (2019)Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer., , and . WISA, volume 2908 of Lecture Notes in Computer Science, page 489-503. Springer, (2003)Improved Preimage Attack for 68-Step HAS-160., , and . ICISC, volume 5984 of Lecture Notes in Computer Science, page 332-348. Springer, (2009)On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher., , and . ICISC, volume 4296 of Lecture Notes in Computer Science, page 51-64. Springer, (2006)Biclique Attack on the Full HIGHT., , and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 365-374. Springer, (2011)