Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Higher-Order Differentials of Ciphers with Low-Degree S-Boxes., , , , and . IACR Cryptol. ePrint Arch., (2020)Weak Linear Layers in Word-Oriented Partial SPN and HADES-Like Ciphers., , and . IACR Cryptol. ePrint Arch., (2020)Revisiting Gilbert's known-key distinguisher., and . Des. Codes Cryptogr., 88 (7): 1401-1445 (2020)Analysis of simplified variants of SHA-256., , , , and . WEWoRC, volume P-74 of LNI, page 123-134. GI, (2005)Poseidon: A New Hash Function for Zero-Knowledge Proof Systems., , , , and . USENIX Security Symposium, page 519-535. USENIX Association, (2021)Weak-Key Distinguishers for AES., , , , and . SAC, volume 12804 of Lecture Notes in Computer Science, page 141-170. Springer, (2020)An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC., , , , , , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 477-506. Springer, (2020)New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba., , , , and . IACR Cryptology ePrint Archive, (2007)Efficient FPGA Implementations of LowMC and Picnic., , , , and . IACR Cryptology ePrint Archive, (2019)New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba., , , , and . FSE, volume 5086 of Lecture Notes in Computer Science, page 470-488. Springer, (2008)