From post

Quantum Attacks: A View of Data Complexity on Offline Simon's Algorithm.

, , , , , и . Inscrypt (2), том 14527 из Lecture Notes in Computer Science, стр. 329-342. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptanalysis of the Authentication in ACORN., и . KSII Trans. Internet Inf. Syst., 13 (8): 4060-4075 (2019)MILP-aided Method of Searching Division Property Using Three Subsets and Applications., , , , и . ASIACRYPT (3), том 11923 из Lecture Notes in Computer Science, стр. 398-427. Springer, (2019)Real-time state recovery attack against MORUS in nonce-misuse setting., и . Sci. China Inf. Sci., 62 (3): 39109:1-39109:3 (2019)MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets., , , , и . IACR Cryptol. ePrint Arch., (2018)New method for combining Matsui's bounding conditions with sequential encoding method., , , , , и . Des. Codes Cryptogr., 91 (11): 3603-3642 (ноября 2023)Exploring Secret Keys in Searching Integral Distinguishers Based on Division Property., , , , и . IACR Trans. Symmetric Cryptol., 2020 (3): 288-304 (2020)Quantum Guess and Determine Attack on Stream Ciphers., , , и . Comput. J., 67 (1): 292-303 (января 2024)A Practical Method to Recover Exact Superpoly in Cube Attack., , , , и . IACR Cryptol. ePrint Arch., (2019)New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers., , , , , , и . IACR Cryptol. ePrint Arch., (2023)Practical Attacks on the Full-round FRIET., , , , и . IACR Cryptol. ePrint Arch., (2022)