Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of the Hash Function Design Strategy Called SMASH., , , and . IEEE Trans. Information Theory, 54 (8): 3647-3655 (2008)Analysis of simplified variants of SHA-256., , , , and . WEWoRC, volume P-74 of LNI, page 123-134. GI, (2005)Cryptanalysis of MDC-2., , , and . EUROCRYPT, volume 5479 of Lecture Notes in Computer Science, page 106-120. Springer, (2009)Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)., , , , , and . ACISP, volume 6812 of Lecture Notes in Computer Science, page 433-438. Springer, (2011)Second-Preimage Analysis of Reduced SHA-1.. ACISP, volume 6168 of Lecture Notes in Computer Science, page 104-116. Springer, (2010)New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba., , , , and . FSE, volume 5086 of Lecture Notes in Computer Science, page 470-488. Springer, (2008)Improved Meet-in-the-Middle Cryptanalysis of KTANTAN., , , , , and . IACR Cryptology ePrint Archive, (2011)PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version)., , , , , , , , , and 3 other author(s). IACR Cryptology ePrint Archive, (2012)Improvements to the Linear Layer of LowMC: A Faster Picnic., , , and . IACR Cryptology ePrint Archive, (2017)New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba., , , , and . IACR Cryptology ePrint Archive, (2007)