From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Differential-Aided Preimage Attacks On Round-Reduced Keccak., , , , и . Comput. J., 66 (12): 3069-3091 (декабря 2023)Quantum key-recovery attack on Feistel structures., и . Sci. China Inf. Sci., 61 (10): 102501:1-102501:7 (2018)Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT., , , , и . Des. Codes Cryptogr., 88 (6): 1103-1126 (2020)MILP-Aided Related-Tweak/Key Impossible Differential Attack and its Applications to QARMA, Joltik-BC., и . IEEE Access, (2019)Cryptanalysis of Reduced-Round Midori64 Block Cipher., и . IACR Cryptol. ePrint Arch., (2016)Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff., , , , и . IACR Cryptol. ePrint Arch., (2020)Quantum Attacks on Some Feistel Block Ciphers., , и . IACR Cryptol. ePrint Arch., (2018)Improved Differential Attacks on GIFT-64., , и . ICICS, том 11999 из Lecture Notes in Computer Science, стр. 447-462. Springer, (2019)Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories., , , , , и . ASIACRYPT (2), том 12492 из Lecture Notes in Computer Science, стр. 727-757. Springer, (2020)Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory., , , и . ASIACRYPT (3), том 14440 из Lecture Notes in Computer Science, стр. 3-33. Springer, (2023)