Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Diversity and Transparency for ECC., , , and . IACR Cryptology ePrint Archive, (2015)Multiple Di fferential Cryptanalysis of Round-Reduced PRINCE (Full version)., , , , and . IACR Cryptology ePrint Archive, (2014)Multiple Differential Cryptanalysis of Round-Reduced PRINCE., , , , and . FSE, volume 8540 of Lecture Notes in Computer Science, page 591-610. Springer, (2014)Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers., , , , , , , , , and 4 other author(s). IACR Cryptology ePrint Archive, (2009)Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3., , , and . Selected Areas in Cryptography, volume 7118 of Lecture Notes in Computer Science, page 230-242. Springer, (2011)Key-Recovery Attacks on Full Kravatte., , , , , , and . IACR Trans. Symmetric Cryptol., 2018 (1): 5-28 (2018)Format Oracles on OpenPGP., , , and . CT-RSA, volume 9048 of Lecture Notes in Computer Science, page 220-236. Springer, (2015)Horizontal Collision Correlation Attack on Elliptic Curves., , , , and . IACR Cryptology ePrint Archive, (2019)A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions., , , , , and . IACR Cryptology ePrint Archive, (2012)Overtaking VEST., and . FSE, volume 4593 of Lecture Notes in Computer Science, page 58-72. Springer, (2007)