From post

Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64.

, , и . ASIACRYPT (2), том 10032 из Lecture Notes in Computer Science, стр. 3-33. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Tight Bounds of Differentially and Linearly Active S-Boxes and Division Property of Lilliput., и . IEEE Trans. Computers, 67 (5): 717-732 (2018)Extended meet-in-the-middle attacks on some Feistel constructions., , , и . Des. Codes Cryptogr., 80 (3): 587-618 (2016)On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants., , и . ACNS, том 9696 из Lecture Notes in Computer Science, стр. 518-536. Springer, (2016)SoK: Peigen - a Platform for Evaluation, Implementation, and Generation of S-boxes., , , и . IACR Cryptology ePrint Archive, (2019)Limited-Birthday Distinguishers for Hash Functions - Collisions beyond the Birthday Bound Can Be Meaningful., , и . ASIACRYPT (2), том 8270 из Lecture Notes in Computer Science, стр. 504-523. Springer, (2013)A New Algorithm for the Unbalanced Meet-in-the-Middle Problem., и . ASIACRYPT (1), том 10031 из Lecture Notes in Computer Science, стр. 627-647. (2016)Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward., , , и . WISA, том 7115 из Lecture Notes in Computer Science, стр. 40-54. Springer, (2011)Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia., , , и . ACISP, том 7372 из Lecture Notes in Computer Science, стр. 87-100. Springer, (2012)Preimage Attacks on Step-Reduced MD5., и . ACISP, том 5107 из Lecture Notes in Computer Science, стр. 282-296. Springer, (2008)Optimizing Online Permutation-Based AE Schemes for Lightweight Applications., и . ISPEC, том 10701 из Lecture Notes in Computer Science, стр. 217-236. Springer, (2017)