Author of the publication

Bounds on the degree of APN polynomials: the case of x-1 + g(x).

, and . Des. Codes Cryptogr., 59 (1-3): 207-222 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A reconfigurable architecture for searching optimal software code to implement block cipher permutation matrices., , and . ReConFig, page 1-8. IEEE, (2013)Two Classes of Quadratic APN Binomials Inequivalent to Power Functions., , and . IEEE Trans. Information Theory, 54 (9): 4218-4229 (2008)SPONGENT: The Design Space of Lightweight Cryptographic Hashing., , , , , and . IEEE Trans. Computers, 62 (10): 2041-2053 (2013)Shorter Linear Straight-Line Programs for MDS Matrices., , , and . IACR Trans. Symmetric Cryptol., 2017 (4): 188-211 (2017)Practical Key Recovery Attacks On Two McEliece Variants., and . IACR Cryptology ePrint Archive, (2009)Weak-Key Subspace Trails and Applications to AES., , , , and . IACR Cryptology ePrint Archive, (2019)A class of quadratic APN binomials inequivalent to power functions., , and . IACR Cryptology ePrint Archive, (2006)Cryptographer's Toolkit for Construction of 8-Bit Bent Functions., and . IACR Cryptology ePrint Archive, (2005)Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions., , , and . IACR Cryptology ePrint Archive, (2018)Switchings, extensions, and reductions in central digraphs., , and . J. Comb. Theory, Ser. A, 118 (7): 2025-2034 (2011)