Author of the publication

Influence of the Linear Layer on the Algebraic Degree in SP-Networks.

, , , , , and . IACR Trans. Symmetric Cryptol., 2022 (1): 110-137 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nonlinear Equivalence of Stream Ciphers., and . FSE, volume 6147 of Lecture Notes in Computer Science, page 40-54. Springer, (2010)Algebraic Algorithms for LWE Problems., , , , and . IACR Cryptology ePrint Archive, (2014)On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms., , , and . IACR Cryptology ePrint Archive, (2011)The rakaposhi Stream Cipher., , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 32-46. Springer, (2009)Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics., , and . Inf., 12 (8): 297 (2021)Partitioning Oracles from Weak Key Forgeries., and . IACR Cryptol. ePrint Arch., (2021)Influence of the Linear Layer on the Algebraic Degree in SP-Networks., , , , , and . IACR Trans. Symmetric Cryptol., 2022 (1): 110-137 (2022)Access Control in Publicly Verifiable Outsourced Computation., , , and . AsiaCCS, page 657-662. ACM, (2015)Revocation in Publicly Verifiable Outsourced Computation., , , and . Inscrypt, volume 8957 of Lecture Notes in Computer Science, page 51-71. Springer, (2014)A Comparison of GKE Protocols based on SIDH., , and . SECRYPT, page 507-514. SCITEPRESS, (2021)