Author of the publication

Distinguishers for the Compression Function and Output Transformation of Hamsi-256.

, , , , , , and . ACISP, volume 6168 of Lecture Notes in Computer Science, page 87-103. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distinguishers for the Compression Function and Output Transformation of Hamsi-256., , , , , , and . ACISP, volume 6168 of Lecture Notes in Computer Science, page 87-103. Springer, (2010)Efficient Low-Latency Masking of Ascon without Fresh Randomness., , , and . IACR Cryptol. ePrint Arch., (2023)On Free-Start Collisions and Collisions for TIB3., and . ISC, volume 5735 of Lecture Notes in Computer Science, page 95-106. Springer, (2009)Cryptanalysis of Round-Reduced HAS-160., , and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 33-47. Springer, (2011)Improving Local Collisions: New Attacks on Reduced SHA-256., , and . EUROCRYPT, volume 7881 of Lecture Notes in Computer Science, page 262-278. Springer, (2013)Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher., , , and . Selected Areas in Cryptography, volume 5867 of Lecture Notes in Computer Science, page 16-35. Springer, (2009)Practical Collisions for SHAMATA-256., , , and . Selected Areas in Cryptography, volume 5867 of Lecture Notes in Computer Science, page 1-15. Springer, (2009)Malicious Hashing: Eve's Variant of SHA-1., , , , and . Selected Areas in Cryptography, volume 8781 of Lecture Notes in Computer Science, page 1-19. Springer, (2014)Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl., , , , , , and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 145-161. Springer, (2013)Rebound Attack on the Full Lane Compression Function., , , , and . ASIACRYPT, volume 5912 of Lecture Notes in Computer Science, page 106-125. Springer, (2009)