Author of the publication

Hyper-bent Functions.

, and . EUROCRYPT, volume 2045 of Lecture Notes in Computer Science, page 406-419. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers., and . CCECE, page 1582-1585. IEEE, (2006)A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem., and . ARES, page 402-409. IEEE Computer Society, (2012)Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting., , and . SPACE, volume 9354 of Lecture Notes in Computer Science, page 139-150. Springer, (2015)Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128., , and . ISC, volume 9866 of Lecture Notes in Computer Science, page 3-17. Springer, (2016)Improved Linear Cryptanalysis of Round-Reduced ARIA., , and . ISC, volume 9866 of Lecture Notes in Computer Science, page 18-34. Springer, (2016)Meet-in-the-Middle Attacks on Reduced Round Piccolo., , and . LightSec, volume 9542 of Lecture Notes in Computer Science, page 3-20. Springer, (2015)On the Interpolation Attacks on Block Ciphers., and . FSE, volume 1978 of Lecture Notes in Computer Science, page 109-120. Springer, (2000)A Meet in the Middle Attack on Reduced Round Kuznyechik., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (10): 2194-2198 (2015)Secrecy Performance in Ultra-Dense Networks with Multiple Associations., , and . GLOBECOM (Workshops), page 1-6. IEEE, (2020)Horus: A Security Assessment Framework for Android Crypto Wallets., , and . SecureComm (2), volume 399 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 120-139. Springer, (2021)