Author of the publication

Reconstructing an S-box from its Difference Distribution Table.

, and . IACR Cryptology ePrint Archive, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical-Time Attacks Against Reduced Variants of MISTY1., and . IACR Cryptology ePrint Archive, (2013)Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64., , , and . FSE, volume 8540 of Lecture Notes in Computer Science, page 390-410. Springer, (2014)Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities., , , , and . J. Cryptol., 33 (3): 1003-1043 (2020)A Related-Key Rectangle Attack on the Full KASUMI., , and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 443-461. Springer, (2005)Rectangle Attacks on 49-Round SHACAL-1., , and . FSE, volume 2887 of Lecture Notes in Computer Science, page 22-35. Springer, (2003)New Results on Boomerang and Rectangle Attacks., , and . FSE, volume 2365 of Lecture Notes in Computer Science, page 1-16. Springer, (2002)Partial Sums Meet FFT: Improved Attack on 6-Round AES., , , , , and . IACR Cryptol. ePrint Arch., (2023)Techniques for cryptanalysis of block ciphers.. Technion - Israel Institute of Technology, Israel, (2006)Finding Collisions against 4-Round SHA-3-384 in Practical Time., , , and . IACR Trans. Symmetric Cryptol., 2022 (3): 239-270 (2022)Deconstructing Alibaba Cloud's Preemptible Instance Pricing., , and . HPDC, page 253-265. ACM, (2023)