Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators., , , and . Inscrypt, volume 7763 of Lecture Notes in Computer Science, page 294-310. Springer, (2012)A New Method for Searching Optimal Differential and Linear Trails in ARX Ciphers., , , and . IEEE Trans. Inf. Theory, 67 (2): 1054-1068 (2021)Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers., , , , and . IACR Cryptol. ePrint Arch., (2022)Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE., , , and . IACR Cryptol. ePrint Arch., (2023)Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect., , , , and . IACR Cryptol. ePrint Arch., (2023)Observer-Based Adaptive Finite-Time Neural Control for Constrained Nonlinear Systems With Actuator Saturation Compensation., , , , , and . IEEE Trans. Instrum. Meas., (2024)Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks., , and . ISC, volume 8783 of Lecture Notes in Computer Science, page 104-119. Springer, (2014)Faster Algorithms for Solving LPN., , and . EUROCRYPT (1), volume 9665 of Lecture Notes in Computer Science, page 168-195. Springer, (2016)Evidence for one-dimensional chiral edge states in a magnetic Weyl semimetal Co$_3$Sn$_2$S$_2$, , , , , , , , , and 4 other author(s). Nat. Commun., 12 (1): 4269 (Jul 13, 2021)Specifications and improvements of LPN solving algorithms.. IET Inf. Secur., 14 (1): 111-125 (2020)