Author of the publication

Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies.

, , , and . ASIACRYPT (4), volume 13794 of Lecture Notes in Computer Science, page 537-566. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An STP-based model toward designing S-boxes with good cryptographic properties., , , , and . Des. Codes Cryptogr., 90 (5): 1179-1202 (2022)Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES., , , , and . SAC, volume 13203 of Lecture Notes in Computer Science, page 223-245. Springer, (2021)Probabilistic Related-Key Statistical Saturation Cryptanalysis., , , and . SAC, volume 14201 of Lecture Notes in Computer Science, page 213-232. Springer, (2023)MILP-aided bit-based division property for primitives with non-bit-permutation linear layers., , and . IET Inf. Secur., 14 (1): 12-20 (2020)A column generation tailored to electric vehicle routing problem with nonlinear battery depreciation., , and . Comput. Oper. Res., (2022)Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures., , , , , , and . ICISC, volume 13849 of Lecture Notes in Computer Science, page 41-60. Springer, (2022)Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2., and . ACISP, volume 8544 of Lecture Notes in Computer Science, page 454-461. Springer, (2014)A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis., , , and . EUROCRYPT (3), volume 13277 of Lecture Notes in Computer Science, page 115-144. Springer, (2022)Differential Cryptanalysis of Reduced-Round PRESENT.. AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, page 40-49. Springer, (2008)Automatic Search for a Variant of Division Property Using Three Subsets., and . CT-RSA, volume 11405 of Lecture Notes in Computer Science, page 412-432. Springer, (2019)