Author of the publication

Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256.

, , , , and . INDOCRYPT, volume 9462 of Lecture Notes in Computer Science, page 198-217. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two Round Information-Theoretic MPC with Malicious Security., , , and . EUROCRYPT (2), volume 11477 of Lecture Notes in Computer Science, page 532-561. Springer, (2019)The Broadcast Message Complexity of Secure Multiparty Computation., , and . ASIACRYPT (1), volume 11921 of Lecture Notes in Computer Science, page 426-455. Springer, (2019)Order-C Secure Multiparty Computation for Highly Repetitive Circuits., , , and . EUROCRYPT (2), volume 12697 of Lecture Notes in Computer Science, page 663-693. Springer, (2021)Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512., , , , and . ICISC, volume 9558 of Lecture Notes in Computer Science, page 119-135. Springer, (2015)Dora: Processor Expressiveness is (Nearly) Free in Zero-Knowledge for RAM Programs., , and . IACR Cryptol. ePrint Arch., (2023)Efficient Set Membership Proofs using MPC-in-the-Head., , , and . IACR Cryptol. ePrint Arch., (2021)Scalable Multiparty Garbling., , , , , and . CCS, page 2158-2172. ACM, (2023)SublonK: Sublinear Prover PlonK., , , , and . Proc. Priv. Enhancing Technol., 2024 (3): 314-335 (2024)On Actively-Secure Elementary MPC Reductions., and . TCC (1), volume 13042 of Lecture Notes in Computer Science, page 717-749. Springer, (2021)Towards Efficiency-Preserving Round Compression in MPC - Do Fewer Rounds Mean More Computation?, , , and . ASIACRYPT (3), volume 12493 of Lecture Notes in Computer Science, page 181-212. Springer, (2020)