Author of the publication

Partial Key Exposure Attacks on Takagi's Variant of RSA.

, , , , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 134-150. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Kipnis-Shamir Attack on HFE Revisited., , and . Inscrypt, volume 4990 of Lecture Notes in Computer Science, page 399-411. Springer, (2007)How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols., , and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 218-235. Springer, (2010)New Calibrator with Points Distributed Conical Helically for Online Calibration of C-Arm., , , , , and . Sensors, 19 (9): 1989 (2019)A Secure and Efficient Handover Authentication Protocol for Wireless Networks., and . Sensors, 14 (7): 11379-11394 (2014)A New Family of Codes and Generalized Kasami Sequences., , and . ISIT, page 907-911. IEEE, (2006)Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits., , , , and . IACR Trans. Symmetric Cryptol., 2019 (1): 84-117 (2019)Boomerang Connectivity Table Revisited. Application to SKINNY and AES., , and . IACR Trans. Symmetric Cryptol., 2019 (1): 118-141 (2019)Analysis of AES, SKINNY, and Others with Constraint Programming., , , , , , and . IACR Trans. Symmetric Cryptol., 2017 (1): 281-306 (2017)Cryptanalysis of the TRMC-4 Public Key Cryptosystem., , , , and . ACNS, volume 4521 of Lecture Notes in Computer Science, page 104-115. Springer, (2007)Design and Implementation of Driving Behavior Analysis Database., , , , and . DBTA, page 1-4. IEEE, (2010)