Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Influence of the Linear Layer on the Algebraic Degree in SP-Networks., , , , , and . IACR Trans. Symmetric Cryptol., 2022 (1): 110-137 (2022)Higher-Order Differentials of Ciphers with Low-Degree S-Boxes., , , , and . IACR Cryptol. ePrint Arch., (2020)An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC., , , , , , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 477-506. Springer, (2020)Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations., , , , , and . IACR Trans. Symmetric Cryptol., 2024 (3): 44-83 (2024)Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi., , and . IACR Cryptol. ePrint Arch., (2024)Reinforced Concrete: A Fast Hash Function for Verifiable Computation., , , , , and . CCS, page 1323-1335. ACM, (2022)On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy., , , , and . IACR Cryptology ePrint Archive, (2019)On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy., , , , and . EUROCRYPT (2), volume 12106 of Lecture Notes in Computer Science, page 674-704. Springer, (2020)Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC., , , , , , and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 371-397. Springer, (2019)