Author of the publication

New Conditional Cube Attack on Keccak Keyed Modes.

, , , , , and . IACR Trans. Symmetric Cryptol., 2019 (2): 94-124 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experimental quantum repeater without quantum memory, , , , , , , , , and 4 other author(s). (2019)cite arxiv:1908.05351Comment: Published online in Nature Photonics.A new power generation calculation method for vertical axis wind turbine control., , and . ICMLC, page 200-204. IEEE, (2015)Iris: A hybrid nanophotonic network design for high-performance and low-power on-chip communication., , , , , , and . JETC, 7 (2): 8:1-8:22 (2011)Bladderless swaying wire-driven Robot Shark., , , and . RAM/CIS, page RAM:155-160. IEEE, (2015)Energy Normalized Correlation for Signal Acquisition in Power-Control-Absent UWB Networks., and . IEEE Communications Letters, 14 (7): 653-655 (2010)Power-efficient variation-aware photonic on-chip network management., , , , , , and . ISLPED, page 31-36. ACM, (2010)Spectrum: a hybrid nanophotonic-electric on-chip network., , , , , , , and . DAC, page 575-580. ACM, (2009)Lesion Detection in Dynamic FDG-PET Using Matched Subspace Detection., , , , and . IEEE Trans. Med. Imaging, 28 (2): 230-240 (2009)The Research on the Case Learning Activity Sustained by a Web-Based Case Assisted Study Environment-Take the Introduction of Industry System Course for Example., , and . ICWL, volume 5145 of Lecture Notes in Computer Science, page 111-121. Springer, (2008)Information Management in E-Learning System., , and . WAIM, volume 3739 of Lecture Notes in Computer Science, page 275-283. Springer, (2005)