Author of the publication

Mars Attacks! Revisited: - Differential Attack on 12 Rounds of the MARS Core and Defeating the Complex MARS Key-Schedule.

, , , , and . INDOCRYPT, volume 7107 of Lecture Notes in Computer Science, page 94-113. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode., , and . IACR Cryptology ePrint Archive, (2009)New Boomerang Attacks on ARIA., , , and . INDOCRYPT, volume 6498 of Lecture Notes in Computer Science, page 163-175. Springer, (2010)Cryptanalysis and design of symmetric primitives.. Bauhaus University, Weimar, (2010)Classification of the SHA-3 Candidates., , and . Symmetric Cryptography, volume 09031 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2009)Some Observations on SHAMATA., and . IACR Cryptology ePrint Archive, (2008)Collision Resistant Double-Length Hashing., , , and . ProvSec, volume 6402 of Lecture Notes in Computer Science, page 102-118. Springer, (2010)On the Security of Tandem-DM., , and . FSE, volume 5665 of Lecture Notes in Computer Science, page 84-103. Springer, (2009)Attacking 9 and 10 Rounds of AES-256., , and . ACISP, volume 5594 of Lecture Notes in Computer Science, page 60-72. Springer, (2009)Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode., , , and . INDOCRYPT, volume 5922 of Lecture Notes in Computer Science, page 157-168. Springer, (2009)New Related-Key Boomerang Attacks on AES., and . INDOCRYPT, volume 5365 of Lecture Notes in Computer Science, page 266-278. Springer, (2008)