Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring the Golden Mean Between Leakage and Fault Resilience and Practice., , and . IACR Cryptology ePrint Archive, (2020)Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC., and . CT-RSA, volume 10159 of Lecture Notes in Computer Science, page 207-222. Springer, (2017)Cryptanalysis of Simpira., , and . IACR Cryptology ePrint Archive, (2016)EliMAC: Speeding Up LightMAC by around 20%., , and . IACR Trans. Symmetric Cryptol., 2023 (2): 69-93 (2023)New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160., , , , , and . IACR Trans. Symmetric Cryptol., 2019 (3): 169-192 (2019)Differential Cryptanalysis of SipHash., , and . Selected Areas in Cryptography, volume 8781 of Lecture Notes in Computer Science, page 165-182. Springer, (2014)Efficient Instances of Docked Double Decker With AES., , , and . IACR Cryptol. ePrint Arch., (2024)Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates., , and . ASIACRYPT (2), volume 9453 of Lecture Notes in Computer Science, page 490-509. Springer, (2015)Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures., , , , , and . ASIACRYPT (2), volume 11273 of Lecture Notes in Computer Science, page 315-342. Springer, (2018)Side-Channel Analysis of Keymill., , , and . COSADE, volume 10348 of Lecture Notes in Computer Science, page 138-152. Springer, (2017)