Author of the publication

Serpent: A New Block Cipher Proposal.

, , and . FSE, volume 1372 of Lecture Notes in Computer Science, page 222-238. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Serpent and Smartcards., , and . CARDIS, volume 1820 of Lecture Notes in Computer Science, page 246-253. Springer, (1998)On Modes of Operation.. FSE, volume 809 of Lecture Notes in Computer Science, page 116-120. Springer, (1993)New Combined Attacks on Block Ciphers., , and . FSE, volume 3557 of Lecture Notes in Computer Science, page 126-144. Springer, (2005)New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru.. FSE, volume 5086 of Lecture Notes in Computer Science, page 444-461. Springer, (2008)Two Practical and Provably Secure Block Ciphers: BEARS and LION., and . FSE, volume 1039 of Lecture Notes in Computer Science, page 113-120. Springer, (1996)Efficient Slide Attacks., , , and . J. Cryptol., 31 (3): 641-670 (2018)Bug Attacks., , and . CRYPTO, volume 5157 of Lecture Notes in Computer Science, page 221-240. Springer, (2008)Unintended Features of APIs: Cryptanalysis of Incremental HMAC., , and . SAC, volume 12804 of Lecture Notes in Computer Science, page 301-325. Springer, (2020)Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs., , and . CRYPTO, volume 4117 of Lecture Notes in Computer Science, page 1-21. Springer, (2006)Related-Key Impossible Differential Attacks on 8-Round AES-192., , and . CT-RSA, volume 3860 of Lecture Notes in Computer Science, page 21-33. Springer, (2006)