Author of the publication

A Fast and Secure Implementation of Sflash.

, , , and . Public Key Cryptography, volume 2567 of Lecture Notes in Computer Science, page 267-278. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Variable elimination strategies and construction of nonlinear polynomial invariant attacks on T-310., and . Cryptologia, 44 (1): 20-38 (2020)On Multiple Symmetric Fixed Points in GOST.. Cryptologia, 39 (4): 322-334 (2015)Algebraic Complexity Reduction and Cryptanalysis of GOST.. IACR Cryptol. ePrint Arch., (2011)Differential Cryptanalysis of GOST., and . IACR Cryptol. ePrint Arch., (2011)CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited.. IACR Cryptol. ePrint Arch., (2007)Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers., , and . IACR Cryptol. ePrint Arch., (2007)On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis., , and . ICICS, volume 3269 of Lecture Notes in Computer Science, page 401-413. Springer, (2004)Feistel Schemes and Bi-linear Cryptanalysis.. CRYPTO, volume 3152 of Lecture Notes in Computer Science, page 23-40. Springer, (2004)Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers., , , , and . INDOCRYPT, volume 6498 of Lecture Notes in Computer Science, page 176-196. Springer, (2010)Algebraic Cryptanalysis of the Data Encryption Standard., and . IMACC, volume 4887 of Lecture Notes in Computer Science, page 152-169. Springer, (2007)