From post

Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers.

, и . INDOCRYPT, том 7668 из Lecture Notes in Computer Science, стр. 283-302. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions., , и . Selected Areas in Cryptography, том 7707 из Lecture Notes in Computer Science, стр. 355-371. Springer, (2012)Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers., и . INDOCRYPT, том 7668 из Lecture Notes in Computer Science, стр. 283-302. Springer, (2012)A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter., , , и . ICICS, том 8958 из Lecture Notes in Computer Science, стр. 132-142. Springer, (2014)Multiscale fire image detection method based on CNN and Transformer., , , , и . Multim. Tools Appl., 83 (16): 49787-49811 (мая 2024)A Flaw in The Internal State Recovery Attack on ALPHA-MAC., , и . IACR Cryptology ePrint Archive, (2010)Integral Attacks on Reduced-Round PRESENT., и . ICICS, том 8233 из Lecture Notes in Computer Science, стр. 331-345. Springer, (2013)Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets., , , и . ACISP, том 8544 из Lecture Notes in Computer Science, стр. 131-147. Springer, (2014)