Author of the publication

Conditional Cube Attack on Reduced-Round Keccak Sponge Function.

, , , , and . IACR Cryptology ePrint Archive, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MILP-aided bit-based division property for primitives with non-bit-permutation linear layers., , and . IET Inf. Secur., 14 (1): 12-20 (2020)On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers., , , and . IACR Trans. Symmetric Cryptol., 2020 (3): 262-287 (2020)Differential Cryptanalysis of Reduced-Round PRESENT.. AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, page 40-49. Springer, (2008)Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds., , , , and . IACR Cryptology ePrint Archive, (2015)Universal Forgery Attack against GCM-RUP., , , , , and . IACR Cryptology ePrint Archive, (2019)An STP-based model toward designing S-boxes with good cryptographic properties., , , , and . Des. Codes Cryptogr., 90 (5): 1179-1202 (2022)SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations., , , , , , , , and . Des. Codes Cryptogr., 90 (1): 155-198 (2022)A column generation tailored to electric vehicle routing problem with nonlinear battery depreciation., , and . Comput. Oper. Res., (2022)Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES., , , , and . SAC, volume 13203 of Lecture Notes in Computer Science, page 223-245. Springer, (2021)Probabilistic Related-Key Statistical Saturation Cryptanalysis., , , and . SAC, volume 14201 of Lecture Notes in Computer Science, page 213-232. Springer, (2023)