Author of the publication

Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.

, , , , , , , , and . IACR Cryptology ePrint Archive, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Kipnis-Shamir Method Solving the MinRank Problem., , , and . IWSEC (Short Papers), page 1-13. Information Processing Society of Japan (IPSJ), (2010)Permission less Block chains and Secure Logging., , and . IEEE ICBC, page 56-60. IEEE, (2019)On the Complexity of Impossible Differential Cryptanalysis., , , , and . Security and Communication Networks, (2018)Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits., , , , and . IACR Trans. Symmetric Cryptol., 2019 (1): 84-117 (2019)Analysis of AES, SKINNY, and Others with Constraint Programming., , , , , , and . IACR Trans. Symmetric Cryptol., 2017 (1): 281-306 (2017)Tighter Security Bound of MIBS Block Cipher against Differential Attack., , , , and . NSS, volume 8792 of Lecture Notes in Computer Science, page 518-525. Springer, (2014)Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR., , , and . NSS, volume 9955 of Lecture Notes in Computer Science, page 398-411. Springer, (2016)Cube Cryptanalysis of Hitag2 Stream Cipher., , , and . CANS, volume 7092 of Lecture Notes in Computer Science, page 15-25. Springer, (2011)Improved MILP Modeling for Automatic Security Evaluation and Application to FOX., , , , and . IEICE Transactions, 98-A (1): 72-80 (2015)Improved linear (hull) cryptanalysis of round-reduced versions of SIMON., , , , , and . SCIENCE CHINA Information Sciences, 60 (3): 39101:1-39101:3 (2017)