From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly., , , , , , и . IEEE Trans. Computers, 68 (10): 1470-1486 (2019)Combining MILP Modeling with Algebraic Bias Evaluation for Linear Mask Search: Improved Fast Correlation Attacks on SNOW., , и . IACR Cryptol. ePrint Arch., (2023)A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique., , и . NSS, том 8792 из Lecture Notes in Computer Science, стр. 166-183. Springer, (2014)FAN: A Lightweight Authenticated Cryptographic Algorithm., , , , и . CT-RSA, том 12704 из Lecture Notes in Computer Science, стр. 299-325. Springer, (2021)Cube Attacks on Non-Blackbox Polynomials Based on Division Property., , , и . IEEE Trans. Computers, 67 (12): 1720-1736 (2018)LOL: A Highly Flexible Framework for Designing Stream Ciphers., , , , , , , , , и . IACR Cryptol. ePrint Arch., (2023)A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher.. IACR Cryptology ePrint Archive, (2015)Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256.. IACR Cryptology ePrint Archive, (2016)Cube Attacks on Non-Blackbox Polynomials Based on Division Property., , , и . CRYPTO (3), том 10403 из Lecture Notes in Computer Science, стр. 250-279. Springer, (2017)A Guess-And-Determine Attack On SNOW-V Stream Cipher., , и . Comput. J., 63 (12): 1789-1812 (2020)