Author of the publication

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.

, , , , , , and . IEEE Trans. Computers, 68 (10): 1470-1486 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integral Cryptanalysis on Full MISTY1.. J. Cryptol., 30 (3): 920-959 (2017)Division Property: Efficient Method to Estimate Upper Bound of Algebraic Degree.. Mycrypt, volume 10311 of Lecture Notes in Computer Science, page 553-571. Springer, (2016)GIFT-COFB., , , , , , , , and . IACR Cryptol. ePrint Arch., (2020)New Impossible Differential Search Tool from Design and Cryptanalysis Aspects - Revealing Structural Properties of Several Ciphers., and . EUROCRYPT (3), volume 10212 of Lecture Notes in Computer Science, page 185-215. (2017)Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64., , and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 3-33. (2016)Improved Integral Attack on HIGHT., , , and . ACISP (1), volume 10342 of Lecture Notes in Computer Science, page 363-383. Springer, (2017)Cube Attacks on Non-Blackbox Polynomials Based on Division Property., , , and . IEEE Trans. Computers, 67 (12): 1720-1736 (2018)Lower Bounds on the Degree of Block Ciphers., , , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 537-566. Springer, (2020)Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes., , , , and . IWSEC, volume 13504 of Lecture Notes in Computer Science, page 107-127. Springer, (2022)PRINCEv2 - More Security for (Almost) No Overhead., , , , , , , , , and . SAC, volume 12804 of Lecture Notes in Computer Science, page 483-511. Springer, (2020)