Author of the publication

Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers.

, , and . IACR Cryptology ePrint Archive, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BISON - Instantiating the Whitened Swap-Or-Not Construction., , , , and . IACR Cryptology ePrint Archive, (2018)Parallel Implementation of BDD Enumeration for LWE., , and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 580-591. Springer, (2016)Searching for Subspace Trails and Truncated Differentials., , and . IACR Trans. Symmetric Cryptol., 2018 (1): 74-100 (2018)Observations on the DLCT and Absolute Indicators., , and . IACR Cryptology ePrint Archive, (2019)Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers., , and . IACR Cryptology ePrint Archive, (2017)High-speed implementation of bcrypt password search using special-purpose hardware., and . ReConFig, page 1-6. IEEE, (2014)Shorter Linear Straight-Line Programs for MDS Matrices., , , and . IACR Trans. Symmetric Cryptol., 2017 (4): 188-211 (2017)Weak-Key Subspace Trails and Applications to AES., , , , and . IACR Cryptology ePrint Archive, (2019)On the Differential-Linear Connectivity Table of Vectorial Boolean Functions., , , , , , and . CoRR, (2019)bison Instantiating the Whitened Swap-Or-Not Construction., , , , and . EUROCRYPT (3), volume 11478 of Lecture Notes in Computer Science, page 585-616. Springer, (2019)