Author of the publication

Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications.

, , , , , and . CRYPTO (3), volume 14083 of Lecture Notes in Computer Science, page 573-606. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cube Attacks on Non-Blackbox Polynomials Based on Division Property., , , and . IEEE Trans. Computers, 67 (12): 1720-1736 (2018)LOL: A Highly Flexible Framework for Designing Stream Ciphers., , , , , , , , , and . IACR Cryptol. ePrint Arch., (2023)A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher.. IACR Cryptology ePrint Archive, (2015)Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256.. IACR Cryptology ePrint Archive, (2016)Cube Attacks on Non-Blackbox Polynomials Based on Division Property., , , and . CRYPTO (3), volume 10403 of Lecture Notes in Computer Science, page 250-279. Springer, (2017)A Guess-And-Determine Attack On SNOW-V Stream Cipher., , and . Comput. J., 63 (12): 1789-1812 (2020)Improved integral attacks without full codebook., , , , , , and . IET Inf. Secur., 12 (6): 513-520 (2018)Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD., , , , and . EUROCRYPT (1), volume 12105 of Lecture Notes in Computer Science, page 466-495. Springer, (2020)Stream cipher designs: a review., , and . Sci. China Inf. Sci., (2020)The Boomerang Attacks on BLAKE and BLAKE2.. Inscrypt, volume 8957 of Lecture Notes in Computer Science, page 286-310. Springer, (2014)