From post

Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT.

, и . EUROCRYPT (1), том 12105 из Lecture Notes in Computer Science, стр. 221-249. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptanalyse de Achterbahn-128/80. CoRR, (2006)Cryptanalysis of ESSENCE., , , , , , и . IACR Cryptology ePrint Archive, (2009)Inside the Hypercube., , , , и . ACISP, том 5594 из Lecture Notes in Computer Science, стр. 202-213. Springer, (2009)Cryptanalysis of Luffa v2 Components., , , и . Selected Areas in Cryptography, том 6544 из Lecture Notes in Computer Science, стр. 388-409. Springer, (2010)How to Improve Rebound Attacks.. CRYPTO, том 6841 из Lecture Notes in Computer Science, стр. 188-205. Springer, (2011)Quantum Boomerang Attacks and Some Applications., , и . SAC, том 13203 из Lecture Notes in Computer Science, стр. 332-352. Springer, (2021)Quantum Algorithms for the k -xor Problem., , и . ASIACRYPT (1), том 11272 из Lecture Notes in Computer Science, стр. 527-559. Springer, (2018)Cryptanalysis of Achterbahn-128/80.. FSE, том 4593 из Lecture Notes in Computer Science, стр. 73-86. Springer, (2007)A Generic Algorithm for Efficient Key Recovery in Differential Attacks - and its Associated Tool., , , , и . EUROCRYPT (1), том 14651 из Lecture Notes in Computer Science, стр. 217-248. Springer, (2024)Quantum Linearization Attacks., , , и . ASIACRYPT (1), том 13090 из Lecture Notes in Computer Science, стр. 422-452. Springer, (2021)