Author of the publication

On the Security of Keyed Hashing Based on Public Permutations.

, , and . CRYPTO (3), volume 14083 of Lecture Notes in Computer Science, page 607-627. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning with Physical Rounding for Linear and Quadratic Leakage Functions., , , , , and . CRYPTO (3), volume 14083 of Lecture Notes in Computer Science, page 410-439. Springer, (2023)Differential Analysis of the Ternary Hash Function Troika., , and . SAC, volume 13742 of Lecture Notes in Computer Science, page 96-115. Springer, (2022)Mathématiques discrètes appliquées à la cryptographie symétrique. (Discrete Mathematics for symmetric cryptography).. Paris-Sorbonne University, France, (2018)Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96., , and . IACR Trans. Symmetric Cryptol., 2020 (1): 289-312 (2020)Attacks Against Filter Generators Exploiting Monomial Mappings., and . FSE, volume 9783 of Lecture Notes in Computer Science, page 78-98. Springer, (2016)On the Security of Keyed Hashing Based on Public Permutations., , and . CRYPTO (3), volume 14083 of Lecture Notes in Computer Science, page 607-627. Springer, (2023)On the security of keyed hashing based on an unkeyed block function., , and . IACR Cryptol. ePrint Arch., (2022)Algebraic Collision Attacks on Keccak., , and . IACR Trans. Symmetric Cryptol., 2021 (1): 239-268 (2021)Generic Attack on Duplex-Based AEAD Modes Using Random Function Statistics., , , and . EUROCRYPT (4), volume 14007 of Lecture Notes in Computer Science, page 348-378. Springer, (2023)Breaking Panther., , and . AFRICACRYPT, volume 13503 of Lecture Notes in Computer Science, page 176-188. Springer Nature Switzerland, (2022)