Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Birthday Attacks on Some MACs Based on Block Ciphers., , , , and . CRYPTO, volume 5677 of Lecture Notes in Computer Science, page 209-230. Springer, (2009)Pseudo-Cryptanalysis of Luffa., , , and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 187-198. Springer, (2010)Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1., , and . ICISC, volume 5984 of Lecture Notes in Computer Science, page 349-361. Springer, (2009)Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes., , , and . Sci. China Inf. Sci., (2021)Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny., , , , and . IACR Trans. Symmetric Cryptol., 2021 (2): 249-291 (2021)New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect., , and . IACR Trans. Symmetric Cryptol., 2019 (3): 121-151 (2019)Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule., , , , and . IACR Cryptol. ePrint Arch., (2019)Improved Attacks on Reduced-Round Camellia-128/192/256., , , and . CT-RSA, volume 9048 of Lecture Notes in Computer Science, page 59-83. Springer, (2015)New Impossible Differential Cryptanalysis of Reduced-Round Camellia., , and . CANS, volume 7092 of Lecture Notes in Computer Science, page 26-39. Springer, (2011)Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512., and . ISPEC, volume 6047 of Lecture Notes in Computer Science, page 1-18. Springer, (2010)