Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preimages for Reduced-Round Tiger., and . WEWoRC, volume 4945 of Lecture Notes in Computer Science, page 90-99. Springer, (2007)Practical Preimages for Maraca., and . Symmetric Cryptography, volume 09031 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2009)DES Collisions Revisited., and . Cryptography and Security, volume 6805 of Lecture Notes in Computer Science, page 13-24. Springer, (2012)Practical Collisions for SHAMATA-256., , , and . Selected Areas in Cryptography, volume 5867 of Lecture Notes in Computer Science, page 1-15. Springer, (2009)Coding Theory and Hash Function Design - A Case Study: The Lane Hash Function., and . Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, volume 23 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2009)Collisions for RC4-Hash., and . ISC, volume 5222 of Lecture Notes in Computer Science, page 355-366. Springer, (2008)ARIA.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Practical Collisions for EnRUPT., and . J. Cryptol., 24 (1): 1-23 (2011)A Practical Attack on KeeLoq., , , , , , , , , and . J. Cryptol., 25 (1): 136-157 (2012)A Differential-Linear Attack on 12-Round Serpent., , and . INDOCRYPT, volume 5365 of Lecture Notes in Computer Science, page 308-321. Springer, (2008)