Author of the publication

Best Differential Characteristic Search of FEAL.

, , and . FSE, volume 1267 of Lecture Notes in Computer Science, page 41-53. Springer, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preimage Attacks on 3, 4, and 5-Pass HAVAL., and . ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, page 253-271. Springer, (2008)Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes., and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 467-484. Springer, (2016)On the Use of GF-Inversion as a Cryptographic Primitive., and . Selected Areas in Cryptography, volume 3006 of Lecture Notes in Computer Science, page 234-247. Springer, (2003)On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers., and . IWSEC, volume 10418 of Lecture Notes in Computer Science, page 3-18. Springer, (2017)Integer Factoring Utilizing PC Cluster.. CHES, volume 4249 of Lecture Notes in Computer Science, page 60. Springer, (2006)Elliptic Curve Arithmetic Using SIMD., , , and . ISC, volume 2200 of Lecture Notes in Computer Science, page 235-247. Springer, (2001)Sieving Using Bucket Sort., and . ASIACRYPT, volume 3329 of Lecture Notes in Computer Science, page 92-102. Springer, (2004)Preimages for Step-Reduced SHA-2., , , , and . ASIACRYPT, volume 5912 of Lecture Notes in Computer Science, page 578-597. Springer, (2009)Improving the Search Algorithm for the Best Linear Expression., , and . CRYPTO, volume 963 of Lecture Notes in Computer Science, page 157-170. Springer, (1995)On Maximum Non-averaged Differential Probability.. Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 118-130. Springer, (1998)