Author of the publication

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl.

, , , and . IACR Cryptol. ePrint Arch., (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security of SM4 Against (Related-Key) Differential Cryptanalysis., , and . ISPEC, volume 10060 of Lecture Notes in Computer Science, page 65-78. (2016)Differential analysis of the Extended Generalized Feistel Networks., and . Inf. Process. Lett., 114 (12): 723-727 (2014)Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia., , and . J. Comput. Sci. Technol., 22 (3): 449-456 (2007)Improved Meet-in-the-Middle Distinguisher on Feistel Schemes., and . IACR Cryptol. ePrint Arch., (2015)Meet-in-the-Middle Attacks on Reduced-Round Midori-64., and . IACR Cryptol. ePrint Arch., (2015)Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes., , , and . Frontiers Comput. Sci., 8 (3): 513-525 (2014)Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha., , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 337-351. Springer, (2012)Neural networks trained with high-dimensional functions approximation data in high-dimensional space., , , , , , and . J. Intell. Fuzzy Syst., 41 (2): 3739-3750 (2021)Analysis of All-or-Nothing Hash Functions., , , and . J. Inf. Sci. Eng., 24 (5): 1473-1484 (2008)Another Look at PMAC., , and . Int. J. Netw. Secur., 5 (1): 16-20 (2007)