default search action
Rusydi H. Makarim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Emanuele Bellini, Juan Grados, Rusydi H. Makarim, Carlo Sanna:
Finding differential trails on ChaCha by means of state functions. Int. J. Appl. Cryptogr. 4(3/4): 156-175 (2024) - 2023
- [j5]Stefano Barbero, Emanuele Bellini, Rusydi H. Makarim:
Rotational analysis of ChaCha permutation. Adv. Math. Commun. 17(6): 1422-1439 (2023) - [j4]Emanuele Bellini, David Gérault, Juan Grados, Rusydi H. Makarim, Thomas Peyrin:
Boosting Differential-Linear Cryptanalysis of ChaCha7 with MILP. IACR Trans. Symmetric Cryptol. 2023(2): 189-223 (2023) - [c9]Solane El Hirch, Joan Daemen, Raghvendra Rohit, Rusydi H. Makarim:
Twin Column Parity Mixers and Gaston - A New Mixing Layer and Permutation. CRYPTO (3) 2023: 475-506 - [c8]Emanuele Bellini, David Gérault, Juan Grados, Rusydi H. Makarim, Thomas Peyrin:
Fully Automated Differential-Linear Attacks Against ARX Ciphers. CT-RSA 2023: 252-276 - [c7]Emanuele Bellini, David Gérault, Juan Grados, Yun Ju Huang, Rusydi H. Makarim, Mohamed Rachidi, Sharwan K. Tiwari:
CLAASP: A Cryptographic Library for the Automated Analysis of Symmetric Primitives. SAC 2023: 387-408 - [i9]Emanuele Bellini, David Gérault, Juan Grados, Rusydi H. Makarim, Thomas Peyrin:
Fully Automated Differential-Linear Attacks against ARX Ciphers. IACR Cryptol. ePrint Arch. 2023: 181 (2023) - [i8]Emanuele Bellini, David Gérault, Juan Grados, Yun Ju Huang, Mohamed Rachidi, Sharwan K. Tiwari, Rusydi H. Makarim:
CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives. IACR Cryptol. ePrint Arch. 2023: 622 (2023) - [i7]Solane El Hirch, Joan Daemen, Raghvendra Rohit, Rusydi H. Makarim:
Twin Column Parity Mixers and Gaston - A New Mixing Layer and Permutation. IACR Cryptol. ePrint Arch. 2023: 799 (2023) - 2022
- [j3]Rusydi H. Makarim, Raghvendra Rohit:
Towards Tight Differential Bounds of Ascon A Hybrid Usage of SMT and MILP. IACR Trans. Symmetric Cryptol. 2022(3): 303-340 (2022) - [c6]Emanuele Bellini, Rusydi H. Makarim, Carlo Sanna, Javier A. Verbel:
An Estimator for the Hardness of the MQ Problem. AFRICACRYPT 2022: 323-347 - [i6]Emanuele Bellini, Rusydi H. Makarim:
Functional Cryptanalysis: Application to reduced-round Xoodoo. IACR Cryptol. ePrint Arch. 2022: 134 (2022) - [i5]Emanuele Bellini, Rusydi H. Makarim, Carlo Sanna, Javier A. Verbel:
An Estimator for the Hardness of the MQ Problem. IACR Cryptol. ePrint Arch. 2022: 708 (2022) - 2021
- [j2]Carlos Aguilar Melchor, Nicolas Aragon, Emanuele Bellini, Florian Caullery, Rusydi H. Makarim, Chiara Marcolla:
Constant Time Algorithms for ROLLO-I-128. SN Comput. Sci. 2(5): 382 (2021) - [c5]Emanuele Bellini, Alessandro De Piccoli, Rusydi H. Makarim, Sergio Polese, Lorenzo Riva, Andrea Visconti:
New Records of Pre-image Search of Reduced SHA-1 Using SAT Solvers. ICMC 2021: 141-151 - 2020
- [i4]Stefano Barbero, Emanuele Bellini, Rusydi H. Makarim:
Rotational analysis of ChaCha permutation. CoRR abs/2008.13406 (2020) - [i3]Stefano Barbero, Emanuele Bellini, Rusydi H. Makarim:
Rotational analysis of ChaCha permutation. IACR Cryptol. ePrint Arch. 2020: 1049 (2020) - [i2]Carlos Aguilar Melchor, Nicolas Aragon, Emanuele Bellini, Florian Caullery, Rusydi H. Makarim, Chiara Marcolla:
Constant time algorithms for ROLLO-I-128. IACR Cryptol. ePrint Arch. 2020: 1066 (2020)
2010 – 2019
- 2019
- [c4]Emanuele Bellini, Florian Caullery, Rusydi H. Makarim, Marc Manzano, Chiara Marcolla, Víctor Mateu:
Advances and Challenges of Rank Metric Cryptography Implementations. ICCD 2019: 325-328 - 2017
- [j1]Putranto H. Utomo, Rusydi H. Makarim:
Solving a Binary Puzzle. Math. Comput. Sci. 11(3-4): 515-526 (2017) - [c3]Rusydi H. Makarim, Marc Stevens:
M4GB: An Efficient Gröbner-Basis Algorithm. ISSAC 2017: 293-300 - 2014
- [c2]Rusydi H. Makarim, Cihangir Tezcan:
Relating Undisturbed Bits to Other Properties of Substitution Boxes. LightSec 2014: 109-125 - [i1]Rusydi H. Makarim, Cihangir Tezcan:
Relating Undisturbed Bits to Other Properties of Substitution Boxes. IACR Cryptol. ePrint Arch. 2014: 855 (2014) - 2012
- [c1]Imad Fakhri Al Shaikhli, Akram M. Zeki, Rusydi H. Makarim, Al-Sakib Khan Pathan:
Protection of Integrity and Ownership of PDF Documents Using Invisible Signature. UKSim 2012: 533-537
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-31 18:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint