Author of the publication

Feistel Ciphers with L2-Decorrelation.

. Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 1-14. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Timed-Release Encryption with Master Time Bound Key., and . WISA, volume 11897 of Lecture Notes in Computer Science, page 167-179. Springer, (2019)How to Sequentialize Independent Parallel Attacks?, and . IACR Cryptology ePrint Archive, (2016)Computational Alternatives to Random Number Generators, , , and . Fifth Annual Workshop on Selected Areas in Cryptography, SAC'98, volume 1556 of Lecture Notes in Computer Science, page 72--80. Springer, (1999)Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges., and . ProvSec, volume 8209 of Lecture Notes in Computer Science, page 121-138. Springer, (2013)New Attacks on LowMC Instances with a Single Plaintext/Ciphertext Pair., , , and . ASIACRYPT (1), volume 13090 of Lecture Notes in Computer Science, page 303-331. Springer, (2021)Towards Witness Encryption Without Multilinear Maps - Extractable Witness Encryption for Multi-subset Sum Instances with No Small Solution to the Homogeneous Problem., and . ICISC, volume 13218 of Lecture Notes in Computer Science, page 28-47. Springer, (2021)The Extended Access Control for Machine Readable Travel Documents., and . BIOSIG, volume P-155 of LNI, page 93-103. GI, (2009)Optimization of the MOVA Undeniable Signature Scheme., , and . Mycrypt, volume 3715 of Lecture Notes in Computer Science, page 196-209. Springer, (2005)ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware., , , , , , , and . CHES, volume 6225 of Lecture Notes in Computer Science, page 398-412. Springer, (2010)Feistel Ciphers with L2-Decorrelation.. Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 1-14. Springer, (1998)