Author of the publication

Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE.

, and . FSE, volume 9054 of Lecture Notes in Computer Science, page 190-216. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Recovering Affine Encodings in White-Box Implementations., , , and . IACR Cryptology ePrint Archive, (2019)On Recovering Affine Encodings in White-Box Implementations., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (3): 121-149 (2018)Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting., , and . EUROCRYPT, volume 7881 of Lecture Notes in Computer Science, page 371-387. Springer, (2013)Note on Impossible Differential Attacks.. FSE, volume 9783 of Lecture Notes in Computer Science, page 416-427. Springer, (2016)Meet-in-the-Middle and Impossible Differential Fault Analysis on AES., , and . CHES, volume 6917 of Lecture Notes in Computer Science, page 274-291. Springer, (2011)Cryptanalysis of AES-PRF and Its Dual., , , , , , and . IACR Trans. Symmetric Cryptol., 2018 (2): 161-191 (2018)Meet-in-the-Middle Attacks on AES. (Attaques par Rencontre par le Milieu sur l'AES).. École Normale Supérieure, Paris, France, (2013)Key-Recovery Attacks on ASASA., , , and . ASIACRYPT (2), volume 9453 of Lecture Notes in Computer Science, page 3-27. Springer, (2015)Faster Chosen-Key Distinguishers on Reduced-Round AES., , and . INDOCRYPT, volume 7668 of Lecture Notes in Computer Science, page 225-243. Springer, (2012)Automatic Search of Attacks on round-reduced AES and Applications., , and . IACR Cryptology ePrint Archive, (2012)