Author of the publication

Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST.

, , , , and . FSE, volume 3017 of Lecture Notes in Computer Science, page 299-316. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures., , and . ICISC, volume 2015 of Lecture Notes in Computer Science, page 1-13. Springer, (2000)A note on the weak invariance principle for local times, and . Statistics & Probability Letters, 32 (2): 147--159 (Mar 1, 1997)IPCC7: Post-Quantum Encryption Scheme Based on a Perfect Dominating Set in 3-Regular Graph., , , , and . IEEE Access, (2024)Practical Entropy Accumulation for Random Number Generators with Image Sensor-Based Quantum Noise Sources., , and . Entropy, 25 (7): 1056 (July 2023)A Practical Privacy-Preserving Cooperative Computation Protocol without Oblivious Transfer for Linear Systems of Equations., and . J. Inf. Process. Syst., 3 (1): 21-25 (2007)Provable Security of KASUMI and 3GPP Encryption Mode f8., , , and . ASIACRYPT, volume 2248 of Lecture Notes in Computer Science, page 255-271. Springer, (2001)Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST., , , , and . FSE, volume 3017 of Lecture Notes in Computer Science, page 299-316. Springer, (2004)Probabilistic Analysis for the Relationship Between Min-Entropy and Guessing Attack., , and . CSA/CUTE, volume 421 of Lecture Notes in Electrical Engineering, page 567-572. Springer, (2016)A Note on Parameters of Random Substitutions by gamma-Diagonal Matrices.. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (6): 1052-1057 (2010)New Public-Key Cryptosystem Using Braid Groups., , , , , and . CRYPTO, volume 1880 of Lecture Notes in Computer Science, page 166-183. Springer, (2000)