Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography., , and . IACR Cryptology ePrint Archive, (2013)An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol., , and . IACR Cryptology ePrint Archive, (2005)A Simplified Representation of AES.. ASIACRYPT (1), volume 8873 of Lecture Notes in Computer Science, page 200-222. Springer, (2014)The Security of Öne-Block-to-Many" Modes of Operation.. FSE, volume 2887 of Lecture Notes in Computer Science, page 376-395. Springer, (2003)Techniques for Low Cost Authentication and Message Authentication.. CARDIS, volume 1820 of Lecture Notes in Computer Science, page 183-192. Springer, (1998)Multiple Differential Cryptanalysis of Round-Reduced PRINCE., , , , and . FSE, volume 8540 of Lecture Notes in Computer Science, page 591-610. Springer, (2014)Security services for protecting radio mobile systems., , and . Ann. des Télécommunications, 55 (7-8): 352-360 (2000)An efficient forward private RFID protocol., , , and . ACM Conference on Computer and Communications Security, page 43-53. ACM, (2009)A Statistical Attack of the FEAL-8 Cryptosystem., and . CRYPTO, volume 537 of Lecture Notes in Computer Science, page 22-33. Springer, (1990)A Known Plaintext Attack of FEAL-4 and FEAL-6., and . CRYPTO, volume 576 of Lecture Notes in Computer Science, page 172-181. Springer, (1991)