Author of the publication

Improved Impossible Differential Attacks on Reduced-Round MISTY1.

, and . WISA, volume 7690 of Lecture Notes in Computer Science, page 15-27. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Note on Twin Diffie-Hellman Problem., and . CIS (1), page 451-454. IEEE Computer Society, (2009)New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia., , , , , , and . FSE, volume 7549 of Lecture Notes in Computer Science, page 90-109. Springer, (2012)New Impossible Differential Attacks on Camellia., and . ISPEC, volume 7232 of Lecture Notes in Computer Science, page 80-96. Springer, (2012)A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique., , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 166-183. Springer, (2014)Co-Z Addition Operation of Hessian Curve., and . CIS, page 915-919. IEEE Computer Society, (2011)Improved Attacks on Reduced-Round Camellia-128/192/256., , , and . CT-RSA, volume 9048 of Lecture Notes in Computer Science, page 59-83. Springer, (2015)Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia., , , and . FSE, volume 9054 of Lecture Notes in Computer Science, page 48-70. Springer, (2015)New Impossible Differential Cryptanalysis of Reduced-Round Camellia., , and . CANS, volume 7092 of Lecture Notes in Computer Science, page 26-39. Springer, (2011)New Impossible Differential Attacks on Camellia., and . IACR Cryptology ePrint Archive, (2011)Improved Impossible Differential Attacks on Reduced-Round MISTY1., and . WISA, volume 7690 of Lecture Notes in Computer Science, page 15-27. Springer, (2012)