Author of the publication

Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s.

, , , , , and . IWSEC, volume 9241 of Lecture Notes in Computer Science, page 97-111. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of AES, SKINNY, and Others with Constraint Programming., , , , , , and . IACR Cryptol. ePrint Arch., (2017)SNR-Centric Power Trace Extractors for Side-Channel Attacks., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (4): 620-632 (2021)VGG-based side channel attack on RSA implementation., , , , and . TrustCom, page 1157-1161. IEEE, (2020)Improved Differential Analysis of Block Cipher PRIDE., , , , , , and . ISPEC, volume 9065 of Lecture Notes in Computer Science, page 209-219. Springer, (2015)Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s., , , , , and . IWSEC, volume 9241 of Lecture Notes in Computer Science, page 97-111. Springer, (2015)Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis., , , , , , , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 141-157. Springer, (2015)New Collision Attacks on Round-Reduced Keccak., , , and . EUROCRYPT (3), volume 10212 of Lecture Notes in Computer Science, page 216-243. (2017)CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks., , , , , and . IACR Cryptol. ePrint Arch., (2021)Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher., and . NSS, volume 9408 of Lecture Notes in Computer Science, page 331-344. Springer, (2015)Tighter Security Bound of MIBS Block Cipher against Differential Attack., , , , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 518-525. Springer, (2014)