Publication | Date of Publication | Type |
---|
QCB: efficient quantum-secure authenticated encryption | 2023-05-12 | Paper |
MuSig2: simple two-round Schnorr multi-signatures | 2022-03-31 | Paper |
Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model | 2022-03-23 | Paper |
The key-dependent message security of key-alternating Feistel ciphers | 2021-12-20 | Paper |
The \texttt{Deoxys} AEAD family | 2021-08-10 | Paper |
Simple Schnorr multi-signatures with applications to bitcoin | 2019-09-12 | Paper |
Minimizing the two-round Even-Mansour cipher | 2018-11-01 | Paper |
Analysis of the single-permutation encrypted Davies-Meyer construction | 2018-10-26 | Paper |
Strengthening the Known-Key Security Notion for Block Ciphers | 2018-05-09 | Paper |
ZMAC: a fast tweakable block cipher mode for highly secure message authentication | 2017-10-27 | Paper |
Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: five rounds are necessary and sufficient | 2017-10-27 | Paper |
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers | 2016-11-30 | Paper |
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC | 2016-11-30 | Paper |
Security Amplification for the Composition of Block Ciphers: Simpler Proofs and New Results | 2016-04-13 | Paper |
How to build an ideal cipher: the indifferentiability of the Feistel construction | 2016-04-07 | Paper |
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing | 2016-03-23 | Paper |
Tweaking Even-Mansour Ciphers | 2015-12-10 | Paper |
The Iterated Random Permutation Problem with Applications to Cascade Encryption | 2015-12-10 | Paper |
On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks | 2015-09-30 | Paper |
Tweakable Blockciphers with Asymptotically Optimal Security | 2015-09-18 | Paper |
Security Analysis of Key-Alternating Feistel Ciphers | 2015-09-18 | Paper |
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes | 2015-09-18 | Paper |
Minimizing the Two-Round Even-Mansour Cipher | 2014-08-07 | Paper |
On the Lossiness of the Rabin Trapdoor Function | 2014-03-25 | Paper |
How to Construct an Ideal Cipher from a Small Set of Public Permutations | 2013-12-10 | Paper |
New Constructions and Applications of Trapdoor DDH Groups | 2013-04-19 | Paper |
An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher | 2013-03-19 | Paper |
A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption | 2013-03-18 | Paper |
On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model | 2012-06-29 | Paper |
On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction | 2012-06-15 | Paper |
A Domain Extender for the Ideal Cipher | 2010-02-24 | Paper |
Building Secure Block Ciphers on Generic Attacks Assumptions | 2009-11-03 | Paper |
Good Variants of HB + Are Hard to Find | 2009-02-12 | Paper |
The Random Oracle Model and the Ideal Cipher Model Are Equivalent | 2009-02-10 | Paper |
Hash Functions and RFID Tags: Mind the Gap | 2009-01-09 | Paper |
Security Analysis of Constructions Combining FIL Random Oracles | 2008-09-16 | Paper |
PRESENT: An Ultra-Lightweight Block Cipher | 2008-09-16 | Paper |
How to Encrypt with the LPN Problem | 2008-08-19 | Paper |
Looking Back at a New Hash Function | 2008-07-08 | Paper |
: Increasing the Security and Efficiency of | 2008-04-15 | Paper |