Author of the publication

Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3.

, , , , and . CT-RSA, volume 13161 of Lecture Notes in Computer Science, page 247-271. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers., , , , , , and . IACR Cryptol. ePrint Arch., (2019)Related-tweakey impossible differential attack on QARMA-128., , , and . Sci. China Inf. Sci., (2022)STP models of optimal differential and linear trail for S-box based ciphers., , , , , , and . Sci. China Inf. Sci., (2021)Improved Linear Key Recovery Attacks on PRESENT., , and . IACR Cryptol. ePrint Arch., (2024)Ultra Efficient Acceleration for De Novo Genome Assembly via Near-Memory Computing., , , , , and . PACT, page 199-212. IEEE, (2021)A Secure IoT Firmware Update Scheme Against SCPA and DoS Attacks., , , , and . J. Comput. Sci. Technol., 36 (2): 419-433 (2021)Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA., , and . IACR Trans. Symmetric Cryptol., 2019 (1): 236-263 (2019)Revisiting the Extension of Matsui's Algorithm 1 to Linear Hulls: Application to TinyJAMBU., , , and . IACR Trans. Symmetric Cryptol., 2022 (2): 161-200 (2022)HyGraph: Accelerating Graph Processing with Hybrid Memory-centric Computing., , , and . DATE, page 330-335. IEEE, (2021)Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3., , , , and . CT-RSA, volume 13161 of Lecture Notes in Computer Science, page 247-271. Springer, (2022)