Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generic Attack on Duplex-Based AEAD Modes Using Random Function Statistics., , , and . EUROCRYPT (4), volume 14007 of Lecture Notes in Computer Science, page 348-378. Springer, (2023)Breaking Panther., , and . AFRICACRYPT, volume 13503 of Lecture Notes in Computer Science, page 176-188. Springer Nature Switzerland, (2022)Improving Generic Attacks Using Exceptional Functions., , , and . IACR Cryptol. ePrint Arch., (2024)A Generic Algorithm for Efficient Key Recovery in Differential Attacks - and its Associated Tool., , , , and . EUROCRYPT (1), volume 14651 of Lecture Notes in Computer Science, page 217-248. Springer, (2024)Cryptanalysis of Elisabeth-4., , , and . ASIACRYPT (3), volume 14440 of Lecture Notes in Computer Science, page 256-284. Springer, (2023)Better Steady than Speedy: Full Break of SPEEDY-7-192., , , and . EUROCRYPT (4), volume 14007 of Lecture Notes in Computer Science, page 36-66. Springer, (2023)