Author of the publication

Improving the Rectangle Attack on GIFT-64.

, , , , , and . SAC, volume 14201 of Lecture Notes in Computer Science, page 43-61. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Phonons in isostructural (ND,Yb):YxGd1-x(VO4) laser crystals: A Raman scattering study, , , , , , and . JOURNAL OF SOLID STATE CHEMISTRY, 184 (4): 905-910 (2011)Driver Fatigue State Detection Based on Facial Key Points., , and . ICSAI, page 144-149. IEEE, (2019)Bifurcations of Heteroclinic Loop with Twisted Conditions., , , , and . Int. J. Bifurc. Chaos, 27 (8): 1750120:1-1750120:21 (2017)Analyzing Uplink Outage Probability of Grant-Free Access and Retransmission for URLLC., , and . WCSP, page 1-6. IEEE, (2021)Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery., , , , , , , and . IACR Cryptol. ePrint Arch., (2024)An Adaptive Heterogeneous Credit Card Fraud Detection Model Based on Deep Reinforcement Training Subset Selection., , , and . IEEE Trans. Artif. Intell., 5 (8): 4026-4041 (August 2024)A secret key negotiation scheme for wireless communications over fading channels., and . FSKD, page 2054-2058. IEEE, (2015)Research on Health Status Assessment of Satellite Communication System Based on Degradation Degree., , , and . ICCT, page 631-637. IEEE, (2020)MTCAM: A Novel Weakly-Supervised Audio-Visual Saliency Prediction Model With Multi-Modal Transformer., , , , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 8 (2): 1756-1771 (April 2024)Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery., , , , , , and . ASIACRYPT (1), volume 13791 of Lecture Notes in Computer Science, page 410-440. Springer, (2022)