Author of the publication

Multiple Differential Cryptanalysis of Round-Reduced PRINCE.

, , , , and . FSE, volume 8540 of Lecture Notes in Computer Science, page 591-610. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flexible Informationsstrukturen mit Ontologien., , and . HMD - Praxis Wirtschaftsinform., (2008)subsequently labeled as volume 45 number 4 by Springer.Key-Recovery Attacks on Full Kravatte., , , , , , and . IACR Trans. Symmetric Cryptol., 2018 (1): 5-28 (2018)Finding Second Preimages of Short Messages for Hamsi-256.. ASIACRYPT, volume 6477 of Lecture Notes in Computer Science, page 20-37. Springer, (2010)An Approach for Qualitatively Predicting Relations from Relations., , , and . SCAI, volume 18 of Frontiers in Artificial Intelligence and Applications, page 38-49. IOS Press, (1993)Fault Attacks on AES with Faulty Ciphertexts Only., , , and . FDTC, page 108-118. IEEE Computer Society, (2013)Talking about 3D scenes: integration of image and speech understanding in a hybrid distributed system., , , and . ICIP (2), page 809-812. (1996)Conception, preuves et analyse de fonctions de hachage cryptographiques. (Design, security proofs and cryptanalysis of cryptographic hash functions).. Télécom ParisTech, France, (2011)A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3., , , and . IACR Cryptology ePrint Archive, (2010)Enriching a Semantic Network Language by Integrating Qualitative Reasoning Techniques., , and . KI, volume 861 of Lecture Notes in Computer Science, page 130-141. Springer, (1994)Cryptanalysis of RadioGatún., and . FSE, volume 5665 of Lecture Notes in Computer Science, page 122-138. Springer, (2009)