Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Free-Start Collision Attacks on 76-step SHA-1., , and . CRYPTO (1), volume 9215 of Lecture Notes in Computer Science, page 623-642. Springer, (2015)Hash Functions and the (Amplified) Boomerang Attack., and . CRYPTO, volume 4622 of Lecture Notes in Computer Science, page 244-263. Springer, (2007)Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128., , and . CRYPTO (1), volume 8042 of Lecture Notes in Computer Science, page 183-203. Springer, (2013)The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS., , , , , , , , and . CRYPTO (2), volume 9815 of Lecture Notes in Computer Science, page 123-153. Springer, (2016)GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption., , , , , and . CHES, volume 10529 of Lecture Notes in Computer Science, page 321-345. Springer, (2017)Multiple Limited-Birthday Distinguishers and Applications., , and . Selected Areas in Cryptography, volume 8282 of Lecture Notes in Computer Science, page 533-550. Springer, (2013)Improved Cryptanalysis of Reduced RIPEMD-160., , , , and . ASIACRYPT (2), volume 8270 of Lecture Notes in Computer Science, page 484-503. Springer, (2013)Slide Attacks on a Class of Hash Functions., , and . ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, page 143-160. Springer, (2008)Combining Compression Functions and Block Cipher-Based Hash Functions., , , and . ASIACRYPT, volume 4284 of Lecture Notes in Computer Science, page 315-331. Springer, (2006)Freestart Collision for Full SHA-1., , and . EUROCRYPT (1), volume 9665 of Lecture Notes in Computer Science, page 459-483. Springer, (2016)