Author of the publication

The Case for Serpent.

, , and . AES Candidate Conference, page 349-354. National Institute of Standards and Technology,, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Slide Attacks., , , and . J. Cryptol., 31 (3): 641-670 (2018)Bug Attacks., , and . CRYPTO, volume 5157 of Lecture Notes in Computer Science, page 221-240. Springer, (2008)Unintended Features of APIs: Cryptanalysis of Incremental HMAC., , and . SAC, volume 12804 of Lecture Notes in Computer Science, page 301-325. Springer, (2020)Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs., , and . CRYPTO, volume 4117 of Lecture Notes in Computer Science, page 1-21. Springer, (2006)Cryptanalysis of the ANSI X9.52 CBCM Mode., and . EUROCRYPT, volume 1403 of Lecture Notes in Computer Science, page 100-111. Springer, (1998)Related-Key Boomerang and Rectangle Attacks., , and . EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, page 507-525. Springer, (2005)An Improvement of Davies' Attack on DES., and . EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 461-467. Springer, (1994)Serpent and Smartcards., , and . CARDIS, volume 1820 of Lecture Notes in Computer Science, page 246-253. Springer, (1998)On Modes of Operation.. FSE, volume 809 of Lecture Notes in Computer Science, page 116-120. Springer, (1993)New Combined Attacks on Block Ciphers., , and . FSE, volume 3557 of Lecture Notes in Computer Science, page 126-144. Springer, (2005)