Author of the publication

Related-Key Impossible Differential Analysis of Full Khudra.

, , , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 135-146. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Permission less Block chains and Secure Logging., , and . IEEE ICBC, page 56-60. IEEE, (2019)Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks., , , and . IACR Cryptol. ePrint Arch., (2021)On the Complexity of Impossible Differential Cryptanalysis., , , , and . Secur. Commun. Networks, (2018)Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits., , , , and . IACR Trans. Symmetric Cryptol., 2019 (1): 84-117 (2019)Motivators of Researchers' Knowledge Sharing and Community Promotion in Online Multi-Background Community., , and . Int. J. Knowl. Manag., 17 (2): 23-49 (2021)Cube Cryptanalysis of Hitag2 Stream Cipher., , , and . CANS, volume 7092 of Lecture Notes in Computer Science, page 15-25. Springer, (2011)On the Kipnis-Shamir Method Solving the MinRank Problem., , , and . IWSEC (Short Papers), page 1-13. Information Processing Society of Japan (IPSJ), (2010)Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR., , , and . NSS, volume 9955 of Lecture Notes in Computer Science, page 398-411. Springer, (2016)Quantum Circuit Implementations of AES with Fewer Qubits., , , , and . ASIACRYPT (2), volume 12492 of Lecture Notes in Computer Science, page 697-726. Springer, (2020)Tighter Security Bound of MIBS Block Cipher against Differential Attack., , , , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 518-525. Springer, (2014)