Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The BMM symmetrising trace conjecture for groups G4, G5, G6, G7, G8, , , and . Journal of Symbolic Computation, (2020)Side-Channel Analysis of Grøstl and Skein., , and . IEEE Symposium on Security and Privacy Workshops, page 16-26. IEEE Computer Society, (2012)Two notions of differential equivalence on Sboxes., , , and . Des. Codes Cryptogr., 87 (2-3): 185-202 (2019)Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)., , and . IACR Cryptology ePrint Archive, (2014)Boomerang Uniformity of Popular S-box Constructions., , and . IACR Cryptology ePrint Archive, (2019)A zero-sum property for the KECCAK-f permutation with 18 rounds., and . ISIT, page 2488-2492. IEEE, (2010)Improved Impossible Differential Attacks against Round-Reduced LBlock., , , and . IACR Cryptology ePrint Archive, (2014)Two Notions of Differential Equivalence on Sboxes., , , and . IACR Cryptology ePrint Archive, (2018)Higher-order differential properties of Keccak and Luffa., , and . IACR Cryptology ePrint Archive, (2010)On the Boomerang Uniformity of Cryptographic Sboxes., and . IACR Trans. Symmetric Cryptol., 2018 (3): 290-310 (2018)