Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BISON - Instantiating the Whitened Swap-Or-Not Construction., , , , and . IACR Cryptology ePrint Archive, (2018)Parallel Implementation of BDD Enumeration for LWE., , and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 580-591. Springer, (2016)Observations on the DLCT and Absolute Indicators., , and . IACR Cryptology ePrint Archive, (2019)Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers., , and . IACR Cryptology ePrint Archive, (2017)Searching for Subspace Trails and Truncated Differentials., , and . IACR Trans. Symmetric Cryptol., 2018 (1): 74-100 (2018)High-speed implementation of bcrypt password search using special-purpose hardware., and . ReConFig, page 1-6. IEEE, (2014)Weak-Key Subspace Trails and Applications to AES., , , , and . IACR Cryptology ePrint Archive, (2019)Shorter Linear Straight-Line Programs for MDS Matrices., , , and . IACR Trans. Symmetric Cryptol., 2017 (4): 188-211 (2017)On the Differential-Linear Connectivity Table of Vectorial Boolean Functions., , , , , , and . CoRR, (2019)bison Instantiating the Whitened Swap-Or-Not Construction., , , , and . EUROCRYPT (3), volume 11478 of Lecture Notes in Computer Science, page 585-616. Springer, (2019)