Author of the publication

The Related-Key Rectangle Attack - Application to SHACAL-1.

, , , , and . ACISP, volume 3108 of Lecture Notes in Computer Science, page 123-136. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High speed search for large-scale digital forensic investigation., , and . e-Forensics, page 31. ICST/ACM, (2008)An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity Module., and . Security and Management, page 408-413. CSREA Press, (2004)Subquadratic Space Complexity Multiplier Using Even Type GNB Based on Efficient Toeplitz Matrix-Vector Product., , , and . IEEE Trans. Computers, 67 (12): 1794-1805 (2018)Evaluating differentially private decision tree model over model inversion attack., , and . Int. J. Inf. Sec., 21 (3): 1-14 (2022)Efficient Construction of Order-Preserving Encryption Using Pseudo Random Function., , and . IEICE Trans. Commun., 98-B (7): 1276-1283 (2015)Data Randomization for Lightweight Secure Data Aggregation in Sensor Network., , , , and . UIC, volume 5061 of Lecture Notes in Computer Science, page 338-351. Springer, (2008)Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme., , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 427-434. Springer, (2006)Authenticated Distance Bounding Protocol with Improved FAR: Beyond the Minimal Bound of FAR., and . IEICE Trans. Commun., 97-B (5): 930-935 (2014)Forensic Data Acquisition from Cell Phones using JTAG Interface., , and . Security and Management, page 410-414. CSREA Press, (2008)Authentication mechanism for fast handoff in cdma2000-WiBro interworking., , and . Sci. China Inf. Sci., 53 (1): 137-146 (2010)