Eik List

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Scrutinizing the security of AES-based hashing and one-way functions2026-03-31Paper
Diving deep into the preimage security of AES-like hashing2024-11-12Paper
On the security of triplex- and multiplex-type constructions with smaller tweaks2024-10-23Paper
Implicit key-stretching security of encryption schemes
Lecture Notes in Computer Science
2023-08-21Paper
Towards closing the security gap of Tweak-aNd-Tweak (TNT)2023-03-21Paper
Pholkos -- efficient large-state tweakable block ciphers from the AES round function2022-07-06Paper
Related-key impossible-differential attack on reduced-round \textsc{Skinny}2022-07-01Paper
\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption2022-06-15Paper
\(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations
Designs, Codes and Cryptography
2022-06-08Paper
The Oribatida v1.3 family of lightweight authenticated encryption schemes
Journal of Mathematical Cryptology
2021-07-14Paper
XHX -- a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing2020-03-02Paper
Parallelizable MACs based on the sum of PRPs with security beyond the birthday bound2020-01-30Paper
Cryptanalysis of ForkAES2020-01-30Paper
ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls2018-12-20Paper
Rasta: a cipher with low ANDdepth and few ANDs per bit2018-09-12Paper
Differential cryptanalysis of round-reduced \textsc{Sparx}-64/1282018-08-10Paper
RIV for robust authenticated encryption
Fast Software Encryption
2018-05-09Paper
\textsc{POEx}: a beyond-birthday-bound-secure on-line cipher
Cryptography and Communications
2018-01-29Paper
Reforgeability of authenticated encryption schemes2017-08-25Paper
Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch
Information Security and Privacy
2016-09-02Paper
Pipelineable on-line encryption
Fast Software Encryption
2015-09-18Paper
A framework for automated independent-biclique cryptanalysis
Fast Software Encryption
2015-09-18Paper
Differential cryptanalysis of round-reduced \textsc{Simon} and \textsc{Speck}
Fast Software Encryption
2015-09-18Paper
Counter-\(b\)DM: a provably secure family of multi-block-length compression functions
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
Mars attacks! revisited: differential attack on 12 rounds of the MARS core and defeating the complex MARS key-schedule
Lecture Notes in Computer Science
2011-12-16Paper


Research outcomes over time


This page was built for person: Eik List