Author of the publication

Rotational Cryptanalysis of ARX Revisited.

, , , , and . FSE, volume 9054 of Lecture Notes in Computer Science, page 519-536. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Related-Key Cryptanalysis of the Full AES-192 and AES-256., and . ASIACRYPT, volume 5912 of Lecture Notes in Computer Science, page 1-18. Springer, (2009)Distinguisher and Related-Key Attack on the Full AES-256., , and . CRYPTO, volume 5677 of Lecture Notes in Computer Science, page 231-249. Springer, (2009)New Preimage Attacks against Reduced SHA-1., and . CRYPTO, volume 7417 of Lecture Notes in Computer Science, page 367-383. Springer, (2012)T5: Hashing Five Inputs with Three Compression Calls., , , and . IACR Cryptol. ePrint Arch., (2021)Cryptanalysis of Hash Functions with Structures.. Selected Areas in Cryptography, volume 5867 of Lecture Notes in Computer Science, page 108-125. Springer, (2009)Rotational Cryptanalysis of ARX., and . FSE, volume 6147 of Lecture Notes in Computer Science, page 333-346. Springer, (2010)Narrow-Bicliques: Cryptanalysis of Full IDEA., , and . EUROCRYPT, volume 7237 of Lecture Notes in Computer Science, page 392-410. Springer, (2012)T₅: Hashing Five Inputs with Three Compression Calls., , , and . ITC, volume 199 of LIPIcs, page 24:1-24:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Cryptanalysis of Luffa v2 Components., , , and . Selected Areas in Cryptography, volume 6544 of Lecture Notes in Computer Science, page 388-409. Springer, (2010)Speeding up Collision Search for Byte-Oriented Hash Functions., , and . CT-RSA, volume 5473 of Lecture Notes in Computer Science, page 164-181. Springer, (2009)