Author of the publication

Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC.

, , , and . IWSEC, volume 8231 of Lecture Notes in Computer Science, page 83-98. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improved Collision Attack on MD4 with Probability Almost 1., , , and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 129-145. Springer, (2005)Indifferentiability of Double-Block-Length Hash Function Without Feed-Forward Operations.. ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 38-57. Springer, (2017)New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length., and . FSE, volume 9783 of Lecture Notes in Computer Science, page 3-22. Springer, (2016)Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles.. Selected Areas in Cryptography, volume 7118 of Lecture Notes in Computer Science, page 338-355. Springer, (2011)Incremental Prediction of Side-Chain Conformation of Proteins by a Genetic Algorithm., and . International Conference on Evolutionary Computation, page 362-367. IEEE, (1994)The Exact Security of PMAC with Two Powering-Up Masks.. IACR Trans. Symmetric Cryptol., 2019 (2): 125-145 (2019)SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (2): 192-217 (2018)The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single Permutation., , and . EUROCRYPT (1), volume 14651 of Lecture Notes in Computer Science, page 97-127. Springer, (2024)Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model., , , and . ProvSec, volume 6980 of Lecture Notes in Computer Science, page 281-296. Springer, (2011)Improved XKX-Based AEAD Scheme: Removing the Birthday Terms.. LATINCRYPT, volume 11368 of Lecture Notes in Computer Science, page 228-246. Springer, (2017)