List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA Applied Cryptography and Network Security | 2016-03-10 | Paper |
| Cryptanalysis of the loiss stream cipher Selected Areas in Cryptography | 2015-12-04 | Paper |
| Boomerang and slide-rotational analysis of the SM3 hash function Selected Areas in Cryptography | 2015-12-04 | Paper |
| Rebound attacks on Stribog Information Security and Cryptology -- ICISC 2013 | 2015-10-16 | Paper |
| Second order collision for the 42-step reduced DHA-256 hash function Information Processing Letters | 2014-04-14 | Paper |
| A Heuristic for Finding Compatible Differential Paths with Application to HAS-160 Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
| On the Sosemanuk related key-IV sets Progress in Cryptology – LATINCRYPT 2012 | 2012-09-21 | Paper |
| Differential fault analysis of Sosemanuk Lecture Notes in Computer Science | 2011-06-29 | Paper |
| Differential fault analysis of HC-128 Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
| On the structural weakness of the GGHN stream cipher Cryptography and Communications | 2010-04-12 | Paper |
| Differential fault analysis of Rabbit Selected Areas in Cryptography | 2009-12-09 | Paper |
| A new distinguishing and key recovery attack on NGG stream cipher Cryptography and Communications | 2009-10-26 | Paper |
Research outcomes over time
This page was built for person: Aleksandar Kircanski