Author of the publication

Integral Cryptanalysis on Full MISTY1.

. CRYPTO (1), volume 9215 of Lecture Notes in Computer Science, page 413-432. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cube Attacks on Non-Blackbox Polynomials Based on Division Property., , , and . IEEE Trans. Computers, 67 (12): 1720-1736 (2018)GIFT-COFB., , , , , , , , and . IACR Cryptol. ePrint Arch., (2020)Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64., , and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 3-33. (2016)Improved Integral Attack on HIGHT., , , and . ACISP (1), volume 10342 of Lecture Notes in Computer Science, page 363-383. Springer, (2017)New Impossible Differential Search Tool from Design and Cryptanalysis Aspects - Revealing Structural Properties of Several Ciphers., and . EUROCRYPT (3), volume 10212 of Lecture Notes in Computer Science, page 185-215. (2017)PRINCEv2 - More Security for (Almost) No Overhead., , , , , , , , , and . SAC, volume 12804 of Lecture Notes in Computer Science, page 483-511. Springer, (2020)Integral Cryptanalysis on Full MISTY1.. J. Cryptol., 30 (3): 920-959 (2017)Division Property: Efficient Method to Estimate Upper Bound of Algebraic Degree.. Mycrypt, volume 10311 of Lecture Notes in Computer Science, page 553-571. Springer, (2016)Lower Bounds on the Degree of Block Ciphers., , , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 537-566. Springer, (2020)Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes., , , , and . IWSEC, volume 13504 of Lecture Notes in Computer Science, page 107-127. Springer, (2022)