Author of the publication

Breaking LWC candidates: sESTATE and Elephant in quantum setting.

, , , , and . Des. Codes Cryptogr., 89 (7): 1405-1432 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MILP-aided Method of Searching Division Property Using Three Subsets and Applications., , , , and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 398-427. Springer, (2019)Cryptanalysis of the Authentication in ACORN., and . KSII Trans. Internet Inf. Syst., 13 (8): 4060-4075 (2019)MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets., , , , and . IACR Cryptol. ePrint Arch., (2018)Real-time state recovery attack against MORUS in nonce-misuse setting., and . Sci. China Inf. Sci., 62 (3): 39109:1-39109:3 (2019)New method for combining Matsui's bounding conditions with sequential encoding method., , , , , and . Des. Codes Cryptogr., 91 (11): 3603-3642 (November 2023)Quantum Guess and Determine Attack on Stream Ciphers., , , and . Comput. J., 67 (1): 292-303 (January 2024)Exploring Secret Keys in Searching Integral Distinguishers Based on Division Property., , , , and . IACR Trans. Symmetric Cryptol., 2020 (3): 288-304 (2020)A Practical Method to Recover Exact Superpoly in Cube Attack., , , , and . IACR Cryptol. ePrint Arch., (2019)Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework., , , , , , and . Des. Codes Cryptogr., 91 (9): 2845-2878 (September 2023)Quantum Attacks: A View of Data Complexity on Offline Simon's Algorithm., , , , , and . Inscrypt (2), volume 14527 of Lecture Notes in Computer Science, page 329-342. Springer, (2023)