Author of the publication

On the Lai-Massey Scheme.

. ASIACRYPT, volume 1716 of Lecture Notes in Computer Science, page 8-19. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of a homomorphic encryption scheme., , and . Cryptogr. Commun., 10 (1): 27-39 (2018)Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity., and . IWSEC, volume 11689 of Lecture Notes in Computer Science, page 343-362. Springer, (2019)Timed-Release Encryption With Master Time Bound Key (Full Version)., and . IACR Cryptology ePrint Archive, (2019)Boosting OMD for Almost Free Authentication of Associated Data., , and . FSE, volume 9054 of Lecture Notes in Computer Science, page 411-427. Springer, (2015)Clever Arbiters Versus Malicious Adversaries - On the Gap Between Known-Input Security and Chosen-Input Security.. The New Codebreakers, volume 9100 of Lecture Notes in Computer Science, page 497-517. Springer, (2016)Timed-Release Encryption with Master Time Bound Key., and . WISA, volume 11897 of Lecture Notes in Computer Science, page 167-179. Springer, (2019)Memory-Efficient Single Data-Complexity Attacks on LowMC Using Partial Sets., , , and . IACR Cryptol. ePrint Arch., (2022)Expected loss analysis for authentication in constrained channels., , and . J. Comput. Secur., 23 (3): 309-329 (2015)Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges., and . ProvSec, volume 8209 of Lecture Notes in Computer Science, page 121-138. Springer, (2013)Cryptanalysis of an E0-like Combiner with Memory., and . J. Cryptol., 21 (3): 430-457 (2008)