Author of the publication

Analysis of Zipper as a Hash Function.

, , , and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 392-403. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A general compiler for password-authenticated group key exchange protocol., , and . Inf. Process. Lett., 110 (4): 160-167 (2010)Co-operative Private Equality Test., and . I. J. Network Security, 1 (3): 149-153 (2005)A strongly secure identity-based authenticated group key exchange protocol., , , and . SCIENCE CHINA Information Sciences, 58 (9): 1-12 (2015)On Guess and Determine Analysis of Rabbit., , , and . Int. J. Found. Comput. Sci., 22 (6): 1283-1296 (2011)Loiss: A Byte-Oriented Stream Cipher., , , , and . IACR Cryptology ePrint Archive, (2010)Loiss: A Byte-Oriented Stream Cipher., , , , and . IWCC, volume 6639 of Lecture Notes in Computer Science, page 109-125. Springer, (2011)Protecting white-box cryptographic implementations with obfuscated round boundaries., , , and . SCIENCE CHINA Information Sciences, 61 (3): 039103:1-039103:3 (2018)Linear Approximations of Addition Modulo 2n-1., , and . FSE, volume 6733 of Lecture Notes in Computer Science, page 359-377. Springer, (2011)CMQV+: An authenticated key exchange protocol from CMQV., and . SCIENCE CHINA Information Sciences, 55 (7): 1666-1674 (2012)An ID-based authenticated dynamic group key agreement with optimal round., , and . SCIENCE CHINA Information Sciences, 55 (11): 2542-2554 (2012)