Author of the publication

The SHAvite-3 - A New Hash Function.

, and . Symmetric Cryptography, volume 09031 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bug Attacks., , and . CRYPTO, volume 5157 of Lecture Notes in Computer Science, page 221-240. Springer, (2008)Efficient Slide Attacks., , , and . J. Cryptol., 31 (3): 641-670 (2018)Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs., , and . CRYPTO, volume 4117 of Lecture Notes in Computer Science, page 1-21. Springer, (2006)New Combined Attacks on Block Ciphers., , and . FSE, volume 3557 of Lecture Notes in Computer Science, page 126-144. Springer, (2005)New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru.. FSE, volume 5086 of Lecture Notes in Computer Science, page 444-461. Springer, (2008)On Modes of Operation.. FSE, volume 809 of Lecture Notes in Computer Science, page 116-120. Springer, (1993)Two Practical and Provably Secure Block Ciphers: BEARS and LION., and . FSE, volume 1039 of Lecture Notes in Computer Science, page 113-120. Springer, (1996)Related-Key Impossible Differential Attacks on 8-Round AES-192., , and . CT-RSA, volume 3860 of Lecture Notes in Computer Science, page 21-33. Springer, (2006)Serpent and Smartcards., , and . CARDIS, volume 1820 of Lecture Notes in Computer Science, page 246-253. Springer, (1998)Cryptanalysis of the ANSI X9.52 CBCM Mode., and . EUROCRYPT, volume 1403 of Lecture Notes in Computer Science, page 100-111. Springer, (1998)