Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machinability of ZTA-TiC ceramics by electrical discharge drilling, , , , , and . Procedia CIRP, (2013)Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN., , and . Inscrypt, volume 7763 of Lecture Notes in Computer Science, page 246-262. Springer, (2012)Linear Distinguishing Attack on Shannon., and . ACISP, volume 5107 of Lecture Notes in Computer Science, page 297-305. Springer, (2008)On the Nonlinearity of Discrete Logarithm in F2nF_2^n., and . SETA, volume 6338 of Lecture Notes in Computer Science, page 333-345. Springer, (2010)A multidimensional linear distinguishing attack on the Shannon cipher., and . IJACT, 1 (3): 161-168 (2009)An upper bound for the linearity of Exponential Welch Costas functions.. Finite Fields Their Appl., 18 (4): 855-862 (2012)Consecutive S-box Lookups: A Timing Attack on SNOW 3G., , , and . ICICS, volume 6476 of Lecture Notes in Computer Science, page 171-185. Springer, (2010)Cache-Timing Template Attacks., and . ASIACRYPT, volume 5912 of Lecture Notes in Computer Science, page 667-684. Springer, (2009)A practical distinguisher for the Shannon cipher., , , , and . Journal of Systems and Software, 83 (4): 543-547 (2010)A Key-Recovery Attack on SOBER-128., and . Symmetric Cryptography, volume 07021 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)