Author of the publication

Meet-in-the-Middle Attacks on Generic Feistel Constructions.

, , , and . ASIACRYPT (1), volume 8873 of Lecture Notes in Computer Science, page 458-477. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizing Online Permutation-Based AE Schemes for Lightweight Applications., and . IEICE Transactions, 102-A (1): 35-47 (2019)Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC., , , , and . IEICE Transactions, 93-D (5): 1087-1095 (2010)Comprehensive Study of Integral Analysis on LBlock., and . IEICE Transactions, 97-A (1): 127-138 (2014)A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search., , , , , , , and . IEICE Transactions, 92-A (1): 87-95 (2009)Distinguishers on Double-Branch Compression Function and Applications to Round-Reduced RIPEMD-128 and RIPEMD-160., and . IEICE Transactions, 97-A (1): 177-190 (2014)Practical Forgeries and Distinguishers against PAES., , , and . IEICE Transactions, 99-A (1): 39-48 (2016)Preimage Attacks against PKC98-Hash and HAS-V., , and . IEICE Transactions, 95-A (1): 111-124 (2012)New Message Differences for Collision Attacks on MD4 and MD5., , , and . IEICE Transactions, 91-A (1): 55-63 (2008)Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols., , , , and . IEICE Transactions, 93-A (1): 84-92 (2010)Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS., , , , and . IACR Cryptology ePrint Archive, (2019)