Author of the publication

Software Benchmarking of the 2nd round CAESAR Candidates.

, and . IACR Cryptology ePrint Archive, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Benchmarking of the 2nd round CAESAR Candidates., and . IACR Cryptology ePrint Archive, (2016)Analysis of lightweight and efficient symmetric-key primitives.. Royal Holloway, University of London, Egham, UK, (2018)British Library, EThOS.Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis., and . SAC, volume 11349 of Lecture Notes in Computer Science, page 163-190. Springer, (2018)State-Recovery Analysis of Spritz., , and . LATINCRYPT, volume 9230 of Lecture Notes in Computer Science, page 204-221. Springer, (2015)Differential Cryptanalysis of Round-Reduced Sparx-64/128., and . ACNS, volume 10892 of Lecture Notes in Computer Science, page 459-475. Springer, (2018)Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing., , , and . ARES, page 102:1-102:8. ACM, (2019)Related-Key Impossible-Differential Attack on Reduced-Round Skinny., , , , , , and . ACNS, volume 10355 of Lecture Notes in Computer Science, page 208-228. Springer, (2017)