Author of the publication

Fully Automated Differential-Linear Attacks Against ARX Ciphers.

, , , , and . CT-RSA, volume 13871 of Lecture Notes in Computer Science, page 252-276. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Estimator for the Hardness of the MQ Problem., , , and . AFRICACRYPT, volume 13503 of Lecture Notes in Computer Science, page 323-347. Springer Nature Switzerland, (2022)Constant Time Algorithms for ROLLO-I-128., , , , , and . SN Comput. Sci., 2 (5): 382 (2021)Rotational analysis of ChaCha permutation., , and . Adv. Math. Commun., 17 (6): 1422-1439 (2023)Twin Column Parity Mixers and Gaston - A New Mixing Layer and Permutation., , , and . CRYPTO (3), volume 14083 of Lecture Notes in Computer Science, page 475-506. Springer, (2023)Solving a Binary Puzzle., and . Math. Comput. Sci., 11 (3-4): 515-526 (2017)Rotational analysis of ChaCha permutation., , and . IACR Cryptol. ePrint Arch., (2020)Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP., , , , and . IACR Trans. Symmetric Cryptol., 2023 (2): 189-223 (2023)Functional Cryptanalysis: Application to reduced-round Xoodoo., and . IACR Cryptol. ePrint Arch., (2022)Constant time algorithms for ROLLO-I-128., , , , , and . IACR Cryptol. ePrint Arch., (2020)Relating Undisturbed Bits to Other Properties of Substitution Boxes., and . LightSec, volume 8898 of Lecture Notes in Computer Science, page 109-125. Springer, (2014)