Author of the publication

New Constructions for Resilient and Highly Nonlinear Boolean Functions.

, and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 498-509. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On a Construction of Short Digests for Authenticating Ad Hoc Networks., , and . ICCSA (2), volume 5593 of Lecture Notes in Computer Science, page 863-876. Springer, (2009)Side Channel Attacks on Irregularly Decimated Generators., and . ICISC, volume 4817 of Lecture Notes in Computer Science, page 116-130. Springer, (2007)Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure., , , and . ACISP, volume 5594 of Lecture Notes in Computer Science, page 73-89. Springer, (2009)Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack., , and . ICICS, volume 5308 of Lecture Notes in Computer Science, page 157-173. Springer, (2008)On the Security of the XOR Sandwiching Paradigm for Multiple Keyed Block Ciphers., , and . SECRYPT, page 305-312. SciTePress, (2013)Lightweight MDS Involution Matrices., , , and . FSE, volume 9054 of Lecture Notes in Computer Science, page 471-493. Springer, (2015)Highly nonlinear balanced S-boxes with improved bound on unrestricted and generalized nonlinearity., , and . Appl. Algebra Eng. Commun. Comput., 19 (4): 323-338 (2008)Lightweight MDS Serial-Type Matrices with Minimal Fixed XOR Count., , , and . AFRICACRYPT, volume 10831 of Lecture Notes in Computer Science, page 51-71. Springer, (2018)Extensions of the Cube Attack Based on Low Degree Annihilators., , , , and . CANS, volume 5888 of Lecture Notes in Computer Science, page 87-102. Springer, (2009)New time-memory-data trade-off attack on the estream finalists and modes of operation of block ciphers., and . AsiaCCS, page 20-21. ACM, (2012)