Author of the publication

Tweaking Key-Alternating Feistel Block Ciphers.

, , , and . ACNS (1), volume 12146 of Lecture Notes in Computer Science, page 69-88. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Markov ciphers and differential cryptanalysis, and . Proceedings of EUROCRYPT '91 --- Advances in cryptology, volume 547 of Lecture Notes in Computer Science, page 17-38. Brighton, UK, Springer-Verlag, (April 1991)Generic attacks on the Lai-Massey scheme., , and . Des. Codes Cryptogr., 83 (2): 407-423 (2017)New zero-sum distinguishers on full 24-round Keccak-f using the division property., , , , and . IET Inf. Secur., 13 (5): 469-478 (2019)Tweaking Key-Alternating Feistel Block Ciphers., , , and . ACNS (1), volume 12146 of Lecture Notes in Computer Science, page 69-88. Springer, (2020)Impossible Differential Cryptanalysis and a Security Evaluation Framework for AND-RX Ciphers., , , , , , and . IEEE Trans. Inf. Theory, 70 (8): 6025-6040 (August 2024)Software Tamper Resistance Based on White-Box SMS4 Implementation., , , and . iSCI, volume 1122 of Communications in Computer and Information Science, page 486-495. Springer, (2019)A Proposal for a New Block Encryption Standard, and . Proceedings of EUROCRYPT '90 --- Advances in cryptology, volume 473 of Lecture Notes in Computer Science, page 389-404. Arhus, Denmark, Springer-Verlag, (May 1991)Real-Time Related-Key Attack on Full-Round Shadow Designed for IoT Nodes., , , , , , and . IEEE Trans. Computers, 73 (2): 613-620 (February 2024)Improved Integral Attack on Generalized Feistel Cipher., , and . Inscrypt, volume 12020 of Lecture Notes in Computer Science, page 463-479. Springer, (2019)Revisiting key schedule's diffusion in relation with round function's diffusion., and . Des. Codes Cryptogr., 73 (1): 85-103 (2014)