Author of the publication

Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security.

, , , , , , and . ACISP, volume 13915 of Lecture Notes in Computer Science, page 403-430. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revisiting the Boomerang Attack from a Perspective of 3-differential., , , , and . IACR Cryptol. ePrint Arch., (2023)Divide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFT., , , and . ACNS (1), volume 13905 of Lecture Notes in Computer Science, page 89-116. Springer, (2023)Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security., , , , , , and . ACISP, volume 13915 of Lecture Notes in Computer Science, page 403-430. Springer, (2023)Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption., , , , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024 (2): 545-587 (2024)Revisiting Yoyo Tricks on AES., , , and . IACR Trans. Symmetric Cryptol., 2023 (4): 28-57 (2023)Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos., , and . IACR Trans. Symmetric Cryptol., 2021 (3): 137-169 (2021)Cryptanalysis of ForkAES., , , , , , , , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 43-63. Springer, (2019)Key Committing Attacks against AES-based AEAD Schemes., , , , and . IACR Trans. Symmetric Cryptol., 2024 (1): 135-157 (2024)Key Committing Security Analysis of AEGIS., and . IACR Cryptol. ePrint Arch., (2023)Yoyo cryptanalysis on Future., , , and . Int. J. Appl. Cryptogr., 4 (3/4): 238-249 (2024)