Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Conditional Cube Attack on Keccak Keyed Modes., , , , , and . IACR Trans. Symmetric Cryptol., 2019 (2): 94-124 (2019)Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques., , , , and . Secur. Commun. Networks, (2018)Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak., , , , and . Comput. J., 63 (8): 1231-1246 (2020)Tree-Based Sentiment Dictionary for Affective Computing: A New Approach., , , , and . HPCC/SmartCity/DSS, page 1704-1709. IEEE, (2018)Impossible Differential Attack on Simpira v2., , and . IACR Cryptology ePrint Archive, (2016)A Refinement of Ä Key-recovery Attack on 855-round Trivium" From CRYPTO 2018., , , , , and . IACR Cryptology ePrint Archive, (2018)MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC., , and . IACR Cryptology ePrint Archive, (2018)Differential Analysis on Block Cipher PRIDE., , , and . IACR Cryptology ePrint Archive, (2014)Detection and Recognition of Abnormal Data Caused by Network Intrusion Using Deep Learning., , and . Informatica (Slovenia), (2021)Quantum cryptanalysis on some generalized Feistel schemes., , and . Sci. China Inf. Sci., 62 (2): 22501:1-22501:12 (2019)