Author of the publication

Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks.

, , and . EUROCRYPT (4), volume 14007 of Lecture Notes in Computer Science, page 128-157. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comprehensive security analysis of CRAFT., , , , and . IACR Trans. Symmetric Cryptol., 2019 (4): 290-317 (2019)Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT., , and . CRYPTO (4), volume 14923 of Lecture Notes in Computer Science, page 38-72. Springer, (2024)Comprehensive security analysis of CRAFT., , , and . IACR Cryptology ePrint Archive, (2019)Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs., , , and . IACR Cryptol. ePrint Arch., (2024)Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2., , , and . IACR Trans. Symmetric Cryptol., 2024 (1): 234-325 (2024)Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges., and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 230-250. Springer, (2022)Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks., , and . EUROCRYPT (4), volume 14007 of Lecture Notes in Computer Science, page 128-157. Springer, (2023)