Author of the publication

Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST.

, , , , and . FSE, volume 3017 of Lecture Notes in Computer Science, page 299-316. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Differential Fault Analysis on Block Cipher SEED-128., , , and . NBiS, page 675-680. IEEE Computer Society, (2012)Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192., , , and . FSE, volume 3557 of Lecture Notes in Computer Science, page 368-383. Springer, (2005)Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1., , , and . ACISP, volume 3108 of Lecture Notes in Computer Science, page 137-148. Springer, (2004)On the Pseudorandomness of a Modification of KASUMI Type Permutations., , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 313-329. Springer, (2004)HIGHT: A New Block Cipher Suitable for Low-Resource Device., , , , , , , , , and 3 other author(s). CHES, volume 4249 of Lecture Notes in Computer Science, page 46-59. Springer, (2006)Provable Security against Differential and Linear Cryptanalysis for the SPN Structure., , , , , and . FSE, volume 1978 of Lecture Notes in Computer Science, page 273-283. Springer, (2000)TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-bit MICAz Mote., , and . IACR Cryptology ePrint Archive, (2008)On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)., , , and . SCN, volume 4116 of Lecture Notes in Computer Science, page 242-256. Springer, (2006)Related-Key Rectangle Attacks on Reduced AES-192 and AES-256., , and . FSE, volume 4593 of Lecture Notes in Computer Science, page 225-241. Springer, (2007)A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure., , , and . IEEE Access, (2020)