Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the security of biquadratic C ∗ public-key cryptosystems and its generalizations.. Cryptography and Communications, 11 (3): 427-442 (2019)On the Security of HFE, HFEv- and Quartz., , and . IACR Cryptology ePrint Archive, (2002)C-differentials, multiplicative uniformity and (almost) perfect c-nonlinearity., , , , and . CoRR, (2019)A Collision-Attack on AES: Combining Side Channel- and Differential-Attack., , , and . CHES, volume 3156 of Lecture Notes in Computer Science, page 163-175. Springer, (2004)Niho type cross-correlation functions via dickson polynomials and Kloosterman sums., , , and . IEEE Trans. Information Theory, 52 (2): 613-627 (2006)An infinite class of quadratic APN functions which are not equivalent to power mappings., , , and . ISIT, page 2637-2641. IEEE, (2006)An infinite class of quadratic APN functions which are not equivalent to power mappings., , , and . IACR Cryptology ePrint Archive, (2005)Construction of bent functions via Niho power functions., , , , , and . J. Comb. Theory, Ser. A, 113 (5): 779-798 (2006)On the Affine Transformations of HFE-Cryptosystems and Systems with Branches.. IACR Cryptology ePrint Archive, (2004)On the Affine Transformations of HFE-Cryptosystems and Systems with Branches.. WCC, volume 3969 of Lecture Notes in Computer Science, page 229-241. Springer, (2005)