Author of the publication

Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward.

, , , and . WISA, volume 7115 of Lecture Notes in Computer Science, page 40-54. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Higher Order Differential Attack Using Chosen Higher Order Differences., , and . Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 106-117. Springer, (1998)Preimage Attacks on Full-ARIRANG (Poster)., , , and . ACISP, volume 6812 of Lecture Notes in Computer Science, page 417-422. Springer, (2011)A Novel Scheme of Schnorr Multi-signatures for Multiple Messages with Key Aggregation., , , , and . BWCCA, volume 159 of Lecture Notes in Networks and Systems, page 284-295. Springer, (2020)Analysis on Bleichenbacher's Forgery Attack., , and . ARES, page 1167-1174. IEEE Computer Society, (2007)Experiments on the Linear Algebra Step in the Number Field Sieve., , and . IWSEC, volume 4752 of Lecture Notes in Computer Science, page 58-73. Springer, (2007)Practical Packing Method in Somewhat Homomorphic Encryption., , , , and . DPM/SETOP, volume 8247 of Lecture Notes in Computer Science, page 34-50. Springer, (2013)Differential Cryptanalysis of a Reduced-Round SEED., and . SCN, volume 2576 of Lecture Notes in Computer Science, page 186-198. Springer, (2002)Improved fast software implementation of block ciphers., , and . ICICS, volume 1334 of Lecture Notes in Computer Science, page 269-273. Springer, (1997)Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward., , , and . WISA, volume 7115 of Lecture Notes in Computer Science, page 40-54. Springer, (2011)Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption., , , , and . ACISP, volume 8544 of Lecture Notes in Computer Science, page 338-353. Springer, (2014)