Author of the publication

Finding Impossible Differentials in ARX Ciphers under Weak Keys.

, , , , , , and . IACR Trans. Symmetric Cryptol., 2024 (1): 326-356 (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A simulation-based two-stage scheduling methodology for controlling semiconductor wafer fabs., and . Expert Syst. Appl., 39 (14): 11677-11684 (2012)Anti-conflict AGV path planning in automated container terminals based on multi-agent reinforcement learning., , , and . Int. J. Prod. Res., 61 (1): 65-80 (2023)Segmentation of high-resolution multispectral image based on extended morphological profiles., and . IGARSS, page 1481-1484. IEEE, (2007)Berth and quay cranes allocation problem with on-shore power supply assignment in container terminals., , and . Comput. Ind. Eng., (2024)A fast arbitrary-ratio downscaling algorithm for video transcoding., , and . SIP, page 247-251. IASTED/ACTA Press, (2007)A new low bit rate speech coder based on intraframe waveform interpolation., and . INTERSPEECH, page 834-837. ISCA, (2000)Robust Parallel Machine Scheduling Problem with Uncertainties and Sequence-Dependent Setup Time., , and . Sci. Program., (2016)Detection of Key Targets in Video Logging Based on Convolutional Neural Network., , and . ICCCS, page 254-257. IEEE, (2021)WOA-BP Based Predicting Daily Production Method of Single Wells in Oilfield., and . CSAI, page 84-90. ACM, (2023)A quantitative characterization of spatial structure features of typical urban land cover types using morphological method., and . IGARSS, page 3714-3716. IEEE, (2005)