Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lightweight MDS Generalized Circulant Matrices., and . FSE, volume 9783 of Lecture Notes in Computer Science, page 101-120. Springer, (2016)Related-Key Impossible-Differential Attack on Reduced-Round SKINNY., , , , , , and . IACR Cryptology ePrint Archive, (2016)Cryptanalysis of JAMBU., , , and . IACR Cryptology ePrint Archive, (2014)Differential Power Analysis on (Non-)Linear Feedback Shift Registers.. IACR Cryptology ePrint Archive, (2020)DAPA: Differential Analysis aided Power Attack on (Non-)Linear Feedback Shift Registers (Extended version)., , and . IACR Cryptol. ePrint Arch., (2020)Survey on the Effectiveness of DAPA-Related Attacks against Shift Register Based AEAD Schemes., , , and . IACR Cryptol. ePrint Arch., (2022)GIFT: A Small Present., , , , , and . IACR Cryptology ePrint Archive, (2017)Human-readable Proof of the Related-Key Security of AES-128., , , and . IACR Trans. Symmetric Cryptol., 2017 (2): 59-83 (2017)GIFT-COFB., , , , , , , , and . IACR Cryptol. ePrint Arch., (2020)SKINNY-AEAD and SKINNY-Hash., , , , , , , , and . IACR Trans. Symmetric Cryptol., 2020 (S1): 88-131 (2020)