Author of the publication

Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.

, , , , , , , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 141-157. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Statistical integral distinguisher with multi-structure and its application on AES-like ciphers., , , , and . Cryptography and Communications, 10 (5): 755-776 (2018)MILP-aided bit-based division property for primitives with non-bit-permutation linear layers., , and . IET Information Security, 14 (1): 12-20 (2020)New Impossible Differential Attack on SAFER + and SAFER + +., , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 170-183. Springer, (2012)Algebraic Techniques in Differential Cryptanalysis Revisited., , , and . ACISP, volume 6812 of Lecture Notes in Computer Science, page 120-141. Springer, (2011)Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2., and . ACISP, volume 8544 of Lecture Notes in Computer Science, page 454-461. Springer, (2014)Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds., , , , and . IACR Cryptology ePrint Archive, (2015)Automatic Search for a Variant of Division Property Using Three Subsets., and . CT-RSA, volume 11405 of Lecture Notes in Computer Science, page 412-432. Springer, (2019)Differential Cryptanalysis of Reduced-Round PRESENT.. AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, page 40-49. Springer, (2008)Multidimensional Zero-Correlation Linear Cryptanalysis of E2., , and . AFRICACRYPT, volume 8469 of Lecture Notes in Computer Science, page 147-164. Springer, (2014)Improved Differential Cryptanalysis of CAST-128 and CAST-256., , and . Inscrypt, volume 10143 of Lecture Notes in Computer Science, page 18-32. Springer, (2016)