Author of the publication

Parallel Verification of Serial MAC and AE Modes.

, , , , and . SAC, volume 13203 of Lecture Notes in Computer Science, page 200-219. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impossible Differential Cryptanalysis of CLEFIA., , , , , and . FSE, volume 5086 of Lecture Notes in Computer Science, page 398-411. Springer, (2008)WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher., , , , , , , , and . SAC, volume 12804 of Lecture Notes in Computer Science, page 535-564. Springer, (2020)A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher., , , and . IEEE Trans. Inf. Theory, 53 (9): 3250-3255 (2007)Parallel Verification of Serial MAC and AE Modes., , , , and . SAC, volume 13203 of Lecture Notes in Computer Science, page 200-219. Springer, (2021)Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure., , , , , , , , and . IWSEC, volume 11689 of Lecture Notes in Computer Science, page 129-145. Springer, (2019)Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box., , , and . ICICS, volume 5308 of Lecture Notes in Computer Science, page 128-140. Springer, (2008)Shorter bit sequence is enough to break stream cipher LILI-128., , , , and . IEEE Trans. Inf. Theory, 51 (12): 4312-4319 (2005)Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure., , , , , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (12): 1629-1639 (2020)Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (4): 799-807 (2010)