Author of the publication

Speeding Up LAT: Generating a Linear Approximation Table Using a Bitsliced Implementation.

, , and . IEEE Access, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Methods for decrypting the data encrypted by the latest Samsung smartphone backup programs in Windows and macOS., , , and . Digit. Investig., (2021)Speeding Up LAT: Generating a Linear Approximation Table Using a Bitsliced Implementation., , and . IEEE Access, (2022)A New Method for Designing Lightweight S-boxes with High Differential and Linear Branch Numbers, and Its Application., , , , , , , , , and 1 other author(s). IACR Cryptol. ePrint Arch., (2020)Enhancing the Related-Key Security of PIPO Through New Key Schedules., , , and . ICISC (1), volume 14561 of Lecture Notes in Computer Science, page 3-18. Springer, (2023)PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations., , , , , , , , , and 1 other author(s). ICISC, volume 12593 of Lecture Notes in Computer Science, page 99-122. Springer, (2020)Preimage attacks on reduced-round Ascon-Xof., , and . Des. Codes Cryptogr., 92 (8): 2197-2217 (August 2024)A method for decrypting data infected with Hive ransomware., , , and . J. Inf. Secur. Appl., (2022)Methods for recovering deleted data from the Realm database: Case study on Minitalk and Xabber., , , , , , and . Digit. Investig., 40 (Supplement): 301353 (2022)