Author of the publication

Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications.

, , and . SAC, volume 14201 of Lecture Notes in Computer Science, page 409-428. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Design of Robust Lightweight Stream Cipher with Short Internal State., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (1): 99-109 (2018)Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (1): 313-324 (2020)Analysis and Improvements of the Full Spritz Stream Cipher., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (6): 1296-1305 (2017)Virtual Vault: A Practical Leakage Resilient Scheme Using Space-Hard Ciphers., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 104-A (1): 182-189 (2021)New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160., , , , , and . IACR Trans. Symmetric Cryptol., 2019 (3): 169-192 (2019)Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V., , , , and . ACISP, volume 13083 of Lecture Notes in Computer Science, page 171-190. Springer, (2021)Differential Fault Attack on Rocca., and . ICISC, volume 13218 of Lecture Notes in Computer Science, page 283-295. Springer, (2021)All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach., and . Selected Areas in Cryptography, volume 7707 of Lecture Notes in Computer Science, page 202-221. Springer, (2012)Current Control of Modular Multilevel Converters Using a Daisy-Chained Distributed Control System with Communication Path Redundancy., and . IECON, page 6108-6113. IEEE, (2019)Conditional Differential Cryptanalysis for Kreyvium., , and . ACISP (1), volume 10342 of Lecture Notes in Computer Science, page 421-434. Springer, (2017)