1 | 2018 | Asiacrypt | pc |
year | title | booktitle | pages | |
---|---|---|---|---|
1 | 2018 | Key-Recovery Attacks on ASASA | jofc | 845-884 |
2 | 2018 | On Recovering Affine Encodings in White-Box Implementations | tches | online |
3 | 2018 | Cryptanalysis of MORUS | asiacrypt | 35-64 |
4 | 2016 | Cryptanalysis of the New CLT Multilinear Map over the Integers | eurocrypt | online |
5 | 2016 | Efficient and Provable White-Box Primitives | asiacrypt | online |
6 | 2015 | Key-Recovery Attacks on ASASA | eprint | 516 |
7 | 2015 | The Iterated Random Permutation Problem with Applications to Cascade Encryption | eprint | 504 |
8 | 2015 | A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro | eprint | 68 |
9 | 2015 | Cryptanalysis of the New Multilinear Map over the Integers | eprint | 941 |
10 | 2015 | A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro | eurocrypt | online |
11 | 2015 | The Iterated Random Permutation Problem with Applications to Cascade Encryption | crypto | online |
12 | 2015 | Key-Recovery Attacks on ASASA | asiacrypt | online |
13 | 2014 | Match Box Meet-in-the-Middle Attack Against KATAN | fse | online |