Author of the publication

Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds.

, and . CANS, volume 6467 of Lecture Notes in Computer Science, page 20-30. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256., , , and . ACISP, volume 6812 of Lecture Notes in Computer Science, page 16-33. Springer, (2011)Improved Linear Attacks on the Chinese Block Cipher Standard., and . J. Comput. Sci. Technol., 29 (6): 1123-1133 (2014)A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework., , , , , and . ACNS Workshops (1), volume 14586 of Lecture Notes in Computer Science, page 340-358. Springer, (2024)Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm., , and . Inscrypt, volume 8567 of Lecture Notes in Computer Science, page 343-358. Springer, (2013)Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently., , and . IACR Cryptology ePrint Archive, (2017)The Boomerang Attacks on the Round-Reduced Skein-512., , and . Selected Areas in Cryptography, volume 7707 of Lecture Notes in Computer Science, page 287-303. Springer, (2012)Partially known information attack on SM2 key exchange protocol., , , and . Sci. China Inf. Sci., 62 (3): 32105:1-32105:14 (2019)Low Data Complexity Attack on Reduced Camellia-256., and . ACISP, volume 7372 of Lecture Notes in Computer Science, page 101-114. Springer, (2012)Improved Cryptanalysis of the Block Cipher KASUMI., , , , and . Selected Areas in Cryptography, volume 7707 of Lecture Notes in Computer Science, page 222-233. Springer, (2012)Practical Attack on the Full MMB Block Cipher., , , and . Selected Areas in Cryptography, volume 7118 of Lecture Notes in Computer Science, page 185-199. Springer, (2011)