Author of the publication

Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton.

, , and . IACR Cryptology ePrint Archive, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton., , and . IACR Cryptology ePrint Archive, (2013)New secure channel coding scheme based on randomly punctured quasi-cyclic-low density parity check codes., , and . IET Commun., 8 (14): 2556-2562 (2014)Efficient Certificateless Signcryption in the Standard Model: Revisiting Luo and Wan's Scheme from Wireless Personal Communications (2018)., , and . Comput. J., 62 (8): 1178-1193 (2019)Biclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers., , and . Secur. Commun. Networks, 9 (1): 27-33 (2016)Non-isomorphic biclique cryptanalysis of full-round Crypton., , and . Comput. Stand. Interfaces, (2015)Impossible Differential Attacks on 13-Round CLEFIA-128., , and . J. Comput. Sci. Technol., 26 (4): 744-750 (2011)Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks., , and . ISC Int. J. Inf. Secur., (October 2023)On computational complexity of impossible differential cryptanalysis., , and . Inf. Process. Lett., 114 (5): 252-255 (2014)Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions., , , and . J. Cryptol., 28 (2): 240-256 (2015)New Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-128., , , and . Selected Areas in Cryptography, volume 5867 of Lecture Notes in Computer Science, page 281-294. Springer, (2009)