Author of the publication

Analysis of Zipper as a Hash Function.

, , , and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 392-403. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential analysis of the Extended Generalized Feistel Networks., and . Inf. Process. Lett., 114 (12): 723-727 (2014)Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia., , and . J. Comput. Sci. Technol., 22 (3): 449-456 (2007)Reflection Cryptanalysis of PRINCE-Like Ciphers., , , , , , , and . J. Cryptology, 28 (3): 718-744 (2015)Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes., , , and . Frontiers of Computer Science, 8 (3): 513-525 (2014)Another Look at PMAC., , and . I. J. Network Security, 5 (1): 16-20 (2007)Analysis of All-or-Nothing Hash Functions., , , and . J. Inf. Sci. Eng., 24 (5): 1473-1484 (2008)Utilizing Probabilistic Linear Equations in Cube Attacks., , and . J. Comput. Sci. Technol., 31 (2): 317-325 (2016)Impossible Differential Cryptanalysis of ARIA and Camellia., , and . IACR Cryptology ePrint Archive, (2006)Improved Meet-in-the-Middle Distinguisher on Feistel Schemes., and . IACR Cryptology ePrint Archive, (2015)Meet-in-the-Middle Attacks on Reduced-Round Midori-64., and . IACR Cryptology ePrint Archive, (2015)