Author of the publication

Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak.

, , and . CRYPTO (2), volume 10402 of Lecture Notes in Computer Science, page 428-451. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Control Design for the Autonomous Horizontal Takeoff Phase of the Reusable Launch Vehicles., , , , and . IEEE Access, (2020)New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions., , , and . ASIACRYPT (2), volume 11273 of Lecture Notes in Computer Science, page 65-95. Springer, (2018)Research on Target Type Recognition Algorithm of Aerial Infrared Image., , and . J. Multim., 8 (5): 468-474 (2013)Modeling and nonlinear computed torque control of ship-mounted mobile satellite communication system., , , and . Int. J. Autom. Comput., 9 (5): 459-466 (2012)Virtual construction technology of tunnel engineering based on BIM platform and measuring robot., , , , , and . Int. J. Syst. Assur. Eng. Manag., 14 (2): 670-680 (April 2023)PostMan: Rapidly Mitigating Bursty Traffic via On-Demand Offloading of Packet Processing., , , , , , , and . IEEE Trans. Parallel Distributed Syst., 33 (2): 374-387 (2022)Finger Multimodal Feature Fusion and Recognition Based on Channel Spatial Attention., , , , and . CoRR, (2022)Applicability of SysML to the Early Definition Phase of Space Missions in a Concurrent Environment., , and . CSDM, page 173-185. Springer, (2011)Research on the brittleness of complex system based on brittleness potential function., , and . SMC (3), page 2735-2740. IEEE, (2004)Depth Dropout: Efficient Training of Residual Convolutional Neural Networks., and . DICTA, page 1-7. IEEE, (2016)