Author of the publication

Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1.

, , and . IACR Cryptology ePrint Archive, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impossible Differential Attack.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Structural Cryptanalysis.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)DES-X (or DESX).. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Codebook Attack.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware., and . Fundam. Inform., 114 (3-4): 221-237 (2012)Distinguisher and Related-Key Attack on the Full AES-256., , and . CRYPTO, volume 5677 of Lecture Notes in Computer Science, page 231-249. Springer, (2009)Privacy Aspects and Subliminal Channels in Zcash., , and . CCS, page 1795-1811. ACM, (2019)Two Trivial Attacks on Trivium., and . Selected Areas in Cryptography, volume 4876 of Lecture Notes in Computer Science, page 36-55. Springer, (2007)Colliding Keys for SC2000-256., and . Selected Areas in Cryptography, volume 8781 of Lecture Notes in Computer Science, page 77-91. Springer, (2014)A Distinguishing Attack of SNOW 2.0 with Linear Masking Method., , and . Selected Areas in Cryptography, volume 3006 of Lecture Notes in Computer Science, page 222-233. Springer, (2003)