Author of the publication

Cryptanalysis of Midori128 Using Impossible Differential Techniques.

, , and . ISPEC, volume 10060 of Lecture Notes in Computer Science, page 1-12. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques., and . FSE, volume 9783 of Lecture Notes in Computer Science, page 428-449. Springer, (2016)Improved Differential Attacks on GIFT-64., , and . ICICS, volume 11999 of Lecture Notes in Computer Science, page 447-462. Springer, (2019)Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques., , , , and . Secur. Commun. Networks, (2018)Cryptanalysis of Midori128 Using Impossible Differential Techniques., , and . ISPEC, volume 10060 of Lecture Notes in Computer Science, page 1-12. (2016)Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques., , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 409-424. Springer, (2016)Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques., and . IACR Cryptology ePrint Archive, (2016)Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128., , , , , and . IACR Trans. Symmetric Cryptol., 2021 (1): 156-184 (2021)Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using χ2-method., , and . Des. Codes Cryptogr., 81 (3): 523-540 (2016)