Author of the publication

Improving Generic Attacks Using Exceptional Functions.

, , , and . CRYPTO (4), volume 14923 of Lecture Notes in Computer Science, page 105-138. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of Elisabeth-4., , , and . ASIACRYPT (3), volume 14440 of Lecture Notes in Computer Science, page 256-284. Springer, (2023)Generic Attack on Duplex-Based AEAD Modes Using Random Function Statistics., , , and . EUROCRYPT (4), volume 14007 of Lecture Notes in Computer Science, page 348-378. Springer, (2023)Breaking Panther., , and . AFRICACRYPT, volume 13503 of Lecture Notes in Computer Science, page 176-188. Springer Nature Switzerland, (2022)A Generic Algorithm for Efficient Key Recovery in Differential Attacks - and its Associated Tool., , , , and . EUROCRYPT (1), volume 14651 of Lecture Notes in Computer Science, page 217-248. Springer, (2024)Improving Generic Attacks Using Exceptional Functions., , , and . CRYPTO (4), volume 14923 of Lecture Notes in Computer Science, page 105-138. Springer, (2024)Better Steady than Speedy: Full Break of SPEEDY-7-192., , , and . EUROCRYPT (4), volume 14007 of Lecture Notes in Computer Science, page 36-66. Springer, (2023)Symmetric Cryptography (Dagstuhl Seminar 24041)., , , , and . Dagstuhl Reports, 14 (1): 72-89 (2024)