Ivica Nikolić

From MaRDI portal
Revision as of 10:04, 24 September 2023 by Import230924090903 (talk | contribs) (Created automatically from import230924090903)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:744346

Available identifiers

zbMath Open nikolic.ivicaMaRDI QIDQ744346

List of research outcomes





PublicationDate of PublicationType
The \texttt{Deoxys} AEAD family2021-08-10Paper
Efficient Design Strategies Based on the AES Round Function2018-05-09Paper
How to use metaheuristics for design of symmetric-key primitives2018-02-23Paper
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem2017-02-01Paper
Extended meet-in-the-middle attacks on some Feistel constructions2016-07-21Paper
Colliding Keys for SC2000-2562016-04-13Paper
Practical Cryptanalysis of PAES2016-04-13Paper
Refinements of the k-tree Algorithm for the Generalized Birthday Problem2016-03-23Paper
The parallel-cut meet-in-the-middle attack2015-11-19Paper
Complementing Feistel Ciphers2015-09-18Paper
Security Analysis of PRINCE2015-09-18Paper
Cryptanalysis of Round-Reduced $$\mathtt{LED}$$2015-09-18Paper
Rotational Cryptanalysis of ARX Revisited2015-09-18Paper
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- $$f$$ f Permutation2015-09-18Paper
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-1282015-01-16Paper
Meet-in-the-Middle Attacks on Generic Feistel Constructions2015-01-16Paper
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework2015-01-06Paper
Rotational rebound attacks on reduced Skein2014-09-25Paper
The resistance of PRESENT-80 against related-key differential attacks2014-06-20Paper
Analysis of BLAKE22014-03-28Paper
Second-Order Differential Collisions for Reduced SHA-2562011-12-02Paper
Known and Chosen Key Differential Distinguishers for Block Ciphers2011-10-27Paper
Search for Related-Key Differential Characteristics in DES-Like Ciphers2011-07-07Paper
Boomerang Attacks on BLAKE-322011-07-07Paper
Tweaking AES2011-03-15Paper
Rotational Rebound Attacks on Reduced Skein2010-12-07Paper
Rotational Cryptanalysis of ARX2010-07-13Paper
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others2010-06-01Paper
Rebound Attack on the Full Lane Compression Function2009-12-15Paper
Distinguisher and Related-Key Attack on the Full AES-2562009-10-20Paper
Cryptanalysis of the LAKE Hash Family2009-08-11Paper
Meet-in-the-Middle Attacks on SHA-3 Candidates2009-08-11Paper
Speeding up Collision Search for Byte-Oriented Hash Functions2009-04-29Paper
Collisions for Step-Reduced SHA-2562008-09-18Paper

Research outcomes over time

This page was built for person: Ivica Nikolić