Author of the publication

Preimage Attack on the Parallel FFT-Hashing Function.

, , , , and . ACISP, volume 4586 of Lecture Notes in Computer Science, page 59-67. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192., , , and . FSE, volume 3557 of Lecture Notes in Computer Science, page 368-383. Springer, (2005)Improved Differential Fault Analysis on Block Cipher SEED-128., , , and . NBiS, page 675-680. IEEE Computer Society, (2012)Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1., , , and . ACISP, volume 3108 of Lecture Notes in Computer Science, page 137-148. Springer, (2004)On the Pseudorandomness of a Modification of KASUMI Type Permutations., , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 313-329. Springer, (2004)HIGHT: A New Block Cipher Suitable for Low-Resource Device., , , , , , , , , and 3 other author(s). CHES, volume 4249 of Lecture Notes in Computer Science, page 46-59. Springer, (2006)Provable Security against Differential and Linear Cryptanalysis for the SPN Structure., , , , , and . FSE, volume 1978 of Lecture Notes in Computer Science, page 273-283. Springer, (2000)Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds., , , and . WEWoRC, volume P-74 of LNI, page 64-75. GI, (2005)A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure., , , and . IEEE Access, (2020)Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions., , , and . IACR Cryptol. ePrint Arch., (2008)TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-bit MICAz Mote., , and . IACR Cryptology ePrint Archive, (2008)