Author of the publication

On Permutation Operations in Cipher Design.

, , , , and . ITCC (2), page 569-577. IEEE Computer Society, (2004)isbn: 0-7695-2108-8.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Collision Search Attacks on SHA-0., , and . CRYPTO, volume 3621 of Lecture Notes in Computer Science, page 1-16. Springer, (2005)Efficient Methods for Integrating Traceability and Broadcast Encryption., , and . CRYPTO, volume 1666 of Lecture Notes in Computer Science, page 372-387. Springer, (1999)On Searching a Table Consistent with Division Poset, , and . CoRR, (2005)Improved Cryptanalysis of SecurID., and . IACR Cryptology ePrint Archive, (2003)On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm., and . CRYPTO, volume 963 of Lecture Notes in Computer Science, page 171-184. Springer, (1995)Storage-Efficient Finite Field Basis Conversion., and . Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 81-93. Springer, (1998)Being Taught can be Faster than Asking Questions., and . COLT, page 144-151. ACM, (1995)Collision-Resistant usage of MD5 and SHA-1 via Message Preprocessing., and . IACR Cryptology ePrint Archive, (2005)On the Development of the Advanced Encryption Standard.. SEC, volume 175 of IFIP Conference Proceedings, page 503-504. Kluwer, (2000)Optimal Constructions of Hybrid Algorithms., , , and . J. Algorithms, 29 (1): 142-164 (1998)