Publication | Date of Publication | Type |
---|
Global existence of smooth solutions for the compressible viscous fluid flow with radiation in \(\mathbb{R}^3\). | 2024-01-18 | Paper |
Global existence of smooth solutions for the diffusion approximation model of general gas in radiation hydrodynamics | 2023-11-07 | Paper |
See-in-the-middle attacks on blockciphers ARIA and DEFAULT | 2023-08-21 | Paper |
Improved see-in-the-middle attacks on AES | 2022-12-07 | Paper |
Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions | 2022-12-05 | Paper |
Stability of non-degenerate stationary solution in inflow problem for a 1-D radiation hydrodynamics model | 2022-11-17 | Paper |
Differential uniformity and linearity of S-boxes by multiplicative complexity | 2022-07-15 | Paper |
\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations | 2022-03-24 | Paper |
Stationary solutions of outflow problem for full compressible Navier-Stokes-Poisson system: existence, stability and convergence rate | 2021-12-08 | Paper |
Non-degenerate stationary solution for outflow problem on the 1-D viscous heat-conducting gas with radiation | 2021-05-03 | Paper |
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis | 2017-07-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q2973463 | 2017-04-03 | Paper |
Higher order eTCR hash functions | 2016-07-06 | Paper |
The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher | 2014-08-20 | Paper |
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher | 2014-03-13 | Paper |
Asymptotic behavior of rarefaction waves for a model system of a radiating gas | 2013-09-26 | Paper |
Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher | 2011-07-14 | Paper |
Notions and relations for RKA-secure permutation and function families | 2011-06-03 | Paper |
DES with any reduced masked rounds is not secure against side-channel attacks | 2010-11-08 | Paper |
Nonlinear stability of strong rarefaction waves for the generalized KdV-Burgers-Kuramoto equation with large initial perturbation | 2010-10-14 | Paper |
Impossible differential cryptanalysis using matrix method | 2010-04-27 | Paper |
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis | 2009-02-10 | Paper |
New Impossible Differential Attacks on AES | 2009-01-22 | Paper |
Convergence rates of solutions toward boundary layer solutions for generalized Benjamin-Bona-Mahony-Burgers equations in the half-space | 2008-12-12 | Paper |
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b | 2008-11-27 | Paper |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract) | 2008-11-27 | Paper |
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL | 2008-09-18 | Paper |
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 | 2008-09-16 | Paper |
HIGHT: A New Block Cipher Suitable for Low-Resource Device | 2008-08-29 | Paper |
Related-Key Rectangle Attack on 42-Round SHACAL-2 | 2008-06-17 | Paper |
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1 | 2008-04-24 | Paper |
Differential and Rectangle Attacks on Reduced-Round SHACAL-1 | 2008-04-11 | Paper |
Progress in Cryptology - INDOCRYPT 2003 | 2007-11-29 | Paper |
Progress in Cryptology - INDOCRYPT 2003 | 2007-11-29 | Paper |
Related-Key Rectangle Attack on the Full SHACAL-1 | 2007-11-29 | Paper |
Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant | 2007-09-07 | Paper |
Cryptography and Coding | 2006-11-01 | Paper |
Information and Communications Security | 2006-10-24 | Paper |
Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
Fast Software Encryption | 2006-06-22 | Paper |
Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
Information Security and Privacy | 2005-09-07 | Paper |
Information Security and Privacy | 2005-09-07 | Paper |
Amplified Boomerang Attack against Reduced-Round SHACAL | 2003-07-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4527872 | 2001-08-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q2719667 | 2001-06-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q2764353 | 2001-01-01 | Paper |