Author of the publication

Fault Propagation Pattern Based DFA on Feistel Ciphers, with Application to Camellia.

, , , and . CIT, page 1050-1057. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia., , and . J. Comput. Sci. Technol., 22 (3): 449-456 (2007)Reflection Cryptanalysis of PRINCE-Like Ciphers., , , , , , , and . J. Cryptology, 28 (3): 718-744 (2015)Differential analysis of the Extended Generalized Feistel Networks., and . Inf. Process. Lett., 114 (12): 723-727 (2014)Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes., , , and . Frontiers of Computer Science, 8 (3): 513-525 (2014)Another Look at PMAC., , and . I. J. Network Security, 5 (1): 16-20 (2007)Analysis of All-or-Nothing Hash Functions., , , and . J. Inf. Sci. Eng., 24 (5): 1473-1484 (2008)Utilizing Probabilistic Linear Equations in Cube Attacks., , and . J. Comput. Sci. Technol., 31 (2): 317-325 (2016)Impossible Differential Cryptanalysis of ARIA and Camellia., , and . IACR Cryptology ePrint Archive, (2006)Improved Meet-in-the-Middle Distinguisher on Feistel Schemes., and . IACR Cryptology ePrint Archive, (2015)Improved Integral Cryptanalysis of FOX Block Cipher., , and . IACR Cryptology ePrint Archive, (2005)