Author of the publication

Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.

, , , and . ASIACRYPT (1), volume 13090 of Lecture Notes in Computer Science, page 214-240. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (11): 1260-1273 (2020)Design Strategy of Z-source Inverter for Utilization of Power Semiconductors with Extremely Low Short-circuit Capability., , , , , and . IECON, page 4997-5002. IEEE, (2019)Novel dead time controlled gate driver using the current sensor of SiC-MOSFET., , , , , and . IECON, page 1651-1656. IEEE, (2015)Generic Key Recovery Attack on Feistel Scheme., and . IACR Cryptology ePrint Archive, (2015)Generic Key Recovery Attack on Feistel Scheme., and . ASIACRYPT (1), volume 8269 of Lecture Notes in Computer Science, page 464-485. Springer, (2013)Yoroi: Updatable Whitebox Cryptography., and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (4): 587-617 (2021)Algebraic Attacks on Round-Reduced Keccak/Xoodoo., , , and . IACR Cryptol. ePrint Arch., (2020)Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC., , , , and . IACR Cryptol. ePrint Arch., (2021)Coefficient Grouping: Breaking Chaghri and More., , , , and . IACR Cryptol. ePrint Arch., (2022)Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm (Extended Version)., , , , and . IACR Cryptol. ePrint Arch., (2021)