Author of the publication

Linearly Self-Equivalent APN Permutations in Small Dimension.

, , and . IEEE Trans. Inf. Theory, 67 (7): 4863-4875 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linearly Self-Equivalent APN Permutations in Small Dimension., , and . IEEE Trans. Inf. Theory, 67 (7): 4863-4875 (2021)Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption., , , , and . CNS, page 1-9. IEEE, (2020)Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)., , , , , and . USENIX Security Symposium, page 213-230. USENIX Association, (2021)"I don't know why I check this..." - Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks., , , , , , , and . SOUPS @ USENIX Security Symposium, page 77-96. USENIX Association, (2022)Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)., , , , , and . IACR Cryptol. ePrint Arch., (2020)Re: What's Up Johnny? - Covert Content Attacks on Email End-to-End Encryption., , , , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 24-42. Springer, (2019)Isolated and Exhausted: Attacking Operating Systems via Site Isolation in the Browser., , and . USENIX Security Symposium, page 7037-7054. USENIX Association, (2023)Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation., , and . USENIX Security Symposium, USENIX Association, (2024)Linearly Self-Equivalent APN Permutations in Small Dimension., , and . CoRR, (2020)ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication., , , , , , , and . USENIX Security Symposium, page 4293-4310. USENIX Association, (2021)