Publication | Date of Publication | Type |
---|
eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices | 2022-12-09 | Paper |
A preimage attack on reduced \textsc{Gimli}-\textsc{Gash} | 2022-12-07 | Paper |
A new authenticated encryption technique for handling long ciphertexts in memory constrained devices | 2018-11-26 | Paper |
Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version) | 2018-11-26 | Paper |
Fault based almost universal forgeries on CLOC and SILC | 2018-10-26 | Paper |
Exploiting the leakage: analysis of some authenticated encryption schemes | 2018-10-26 | Paper |
SPF: A New Family of Efficient Format-Preserving Encryption Algorithms | 2017-05-05 | Paper |
Biclique Cryptanalysis of Full Round AES-128 Based Hashing Modes | 2016-07-25 | Paper |
Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512 | 2016-05-19 | Paper |
Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks | 2016-05-19 | Paper |
PPAE: Practical Parazoa Authenticated Encryption Family | 2016-01-27 | Paper |
Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256 | 2016-01-12 | Paper |
Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique | 2015-11-25 | Paper |
Rig: A Simple, Secure and Flexible Design for Password Hashing | 2015-11-25 | Paper |
Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message | 2015-10-20 | Paper |
sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices | 2015-10-20 | Paper |
Bicliques with Minimal Data and Time Complexity for AES | 2015-09-11 | Paper |
A Weak Key Class of XTEA for a Related-Key Rectangle Attack | 2014-08-21 | Paper |
Sufficient Conditions on Padding Schemes of Sponge Construction and Sponge-Based Authenticated-Encryption Scheme | 2014-08-20 | Paper |
Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN | 2014-01-14 | Paper |
On the Security of Hash Functions Employing Blockcipher Postprocessing | 2011-07-07 | Paper |
Advances in Cryptology - ASIACRYPT 2003 | 2010-01-05 | Paper |
A New Dedicated 256-Bit Hash Function: FORK-256 | 2009-04-02 | Paper |
Preimage Attack on the Parallel FFT-Hashing Function | 2009-03-06 | Paper |
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL | 2008-09-18 | Paper |
Improved Indifferentiability Security Analysis of chopMD Hash Function | 2008-09-18 | Paper |
HIGHT: A New Block Cipher Suitable for Low-Resource Device | 2008-08-29 | Paper |
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding | 2008-04-24 | Paper |
RC4-Hash: A New Hash Function Based on RC4 | 2008-04-11 | Paper |
Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
Information Security and Privacy | 2005-09-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4413861 | 2003-07-21 | Paper |