Author of the publication

Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers

, and (Eds.) volume 3017 of Lecture Notes in Computer Science, Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential and invertibility properties of BLAKE (full version)., , , , and . IACR Cryptology ePrint Archive, (2010)Fast Correlation Attacks: Methods and Countermeasures.. FSE, volume 6733 of Lecture Notes in Computer Science, page 55-67. Springer, (2011)The Hash Function Family LAKE., , and . FSE, volume 5086 of Lecture Notes in Computer Science, page 36-53. Springer, (2008)Correlation Properties of Combiners with Memory in Stream Ciphers., and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 204-213. Springer, (1990)Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD., , , , and . EUROCRYPT (1), volume 12105 of Lecture Notes in Computer Science, page 466-495. Springer, (2020)Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128., , , and . IACR Cryptology ePrint Archive, (2020)Modeling for Three-Subset Division Property without Unknown Subset., , , , and . IACR Cryptology ePrint Archive, (2020)First demonstration of a post-quantum key-exchange with a nanosatellite., , , , , and . CoRR, (2022)Coefficient Grouping: Breaking Chaghri and More., , , , and . IACR Cryptol. ePrint Arch., (2022)Algebraic Attacks on Round-Reduced Keccak/Xoodoo., , , and . IACR Cryptol. ePrint Arch., (2020)