Author of the publication

Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H.

, , , , and . INDOCRYPT, volume 3348 of Lecture Notes in Computer Science, page 191-205. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Differential Fault Analysis on Block Cipher SEED-128., , , and . NBiS, page 675-680. IEEE Computer Society, (2012)On the Pseudorandomness of a Modification of KASUMI Type Permutations., , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 313-329. Springer, (2004)Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1., , , and . ACISP, volume 3108 of Lecture Notes in Computer Science, page 137-148. Springer, (2004)HIGHT: A New Block Cipher Suitable for Low-Resource Device., , , , , , , , , and 3 other author(s). CHES, volume 4249 of Lecture Notes in Computer Science, page 46-59. Springer, (2006)Provable Security against Differential and Linear Cryptanalysis for the SPN Structure., , , , , and . FSE, volume 1978 of Lecture Notes in Computer Science, page 273-283. Springer, (2000)Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192., , , and . FSE, volume 3557 of Lecture Notes in Computer Science, page 368-383. Springer, (2005)On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)., , , and . SCN, volume 4116 of Lecture Notes in Computer Science, page 242-256. Springer, (2006)Related-Key Rectangle Attacks on Reduced AES-192 and AES-256., , and . FSE, volume 4593 of Lecture Notes in Computer Science, page 225-241. Springer, (2007)A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure., , , and . IEEE Access, (2020)A Preimage Attack on Reduced Gimli-Hash., , , and . ICISC, volume 13218 of Lecture Notes in Computer Science, page 217-237. Springer, (2021)