Publication | Date of Publication | Type |
---|
The COLM Authenticated Encryption Scheme | 2024-04-21 | Paper |
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure | 2024-03-14 | Paper |
Higher-order DCA against standard side-channel countermeasures | 2023-10-20 | Paper |
Troika: a ternary cryptographic hash function | 2020-01-09 | Paper |
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants | 2018-05-09 | Paper |
Linear cryptanalysis of DES with asymmetries | 2018-04-06 | Paper |
Hold your breath, PRIMATEs are lightweight | 2018-02-16 | Paper |
SPONGENT: The Design Space of Lightweight Cryptographic Hashing | 2017-07-12 | Paper |
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks | 2017-07-12 | Paper |
Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness | 2017-02-01 | Paper |
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core | 2016-12-21 | Paper |
Exploring Energy Efficiency of Lightweight Block Ciphers | 2016-05-19 | Paper |
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks | 2016-05-19 | Paper |
How Secure is AES Under Leakage | 2016-03-23 | Paper |
Midori: A Block Cipher for Low Energy | 2016-03-23 | Paper |
Cryptanalysis of Two Fault Countermeasure Schemes | 2016-01-12 | Paper |
Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA | 2015-10-01 | Paper |
Twisted Polynomials and Forgery Attacks on GCM | 2015-09-30 | Paper |
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2 | 2015-09-18 | Paper |
Towards Understanding the Known-Key Security of Block Ciphers | 2015-09-18 | Paper |
ALE: AES-Based Lightweight Authenticated Encryption | 2015-09-18 | Paper |
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography | 2015-09-18 | Paper |
Comb to Pipeline: Fast Software Encryption Revisited | 2015-09-18 | Paper |
Key Recovery Attacks on Recent Authenticated Ciphers | 2015-09-17 | Paper |
Bicliques with Minimal Data and Time Complexity for AES | 2015-09-11 | Paper |
General Application of FFT in Cryptanalysis and Improved Attack on CAST-256 | 2015-09-10 | Paper |
Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis | 2015-06-17 | Paper |
How to Securely Release Unverified Plaintext in Authenticated Encryption | 2015-01-16 | Paper |
Towards the optimality of Feistel ciphers with substitution-permutation functions | 2014-08-18 | Paper |
Route 66: Passively Breaking All GSM Channels | 2014-07-24 | Paper |
On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers | 2014-07-07 | Paper |
Multidimensional Zero-Correlation Linear Cryptanalysis of E2 | 2014-06-24 | Paper |
Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard | 2014-04-17 | Paper |
Linear hulls with correlation zero and linear cryptanalysis of block ciphers | 2014-03-17 | Paper |
Key Difference Invariant Bias in Block Ciphers | 2013-12-10 | Paper |
Parallelizable and Authenticated Online Ciphers | 2013-12-10 | Paper |
Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware | 2013-10-10 | Paper |
Bounds in Shallows and in Miseries | 2013-09-02 | Paper |
On the Indifferentiability of Key-Alternating Ciphers | 2013-09-02 | Paper |
Improved Impossible Differential Attacks on Large-Block Rijndael | 2013-06-04 | Paper |
Analysis of \(3\)-line generalized Feistel networks with double SD-functions | 2013-04-04 | Paper |
Integral and Multidimensional Linear Distinguishers with Correlation Zero | 2013-03-19 | Paper |
Generalized Feistel networks revisited | 2013-01-28 | Paper |
Zero Correlation Linear Cryptanalysis with Reduced Data Complexity | 2013-01-08 | Paper |
The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers | 2012-07-25 | Paper |
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations | 2012-06-29 | Paper |
ENUMERATING THE k-TANGLE PROJECTIONS | 2012-04-30 | Paper |
On the differential and linear efficiency of balanced Feistel networks | 2012-03-27 | Paper |
Biclique Cryptanalysis of the Full AES | 2011-12-02 | Paper |
Double SP-Functions: Enhanced Generalized Feistel Networks | 2011-07-07 | Paper |
On unbalanced feistel networks with contracting MDS diffusion | 2011-04-08 | Paper |
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN | 2011-03-15 | Paper |
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs | 2010-03-16 | Paper |
Linear Slide Attacks on the KeeLoq Block Cipher | 2009-02-10 | Paper |
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection | 2009-01-22 | Paper |
Hash Functions and RFID Tags: Mind the Gap | 2009-01-09 | Paper |
PRESENT: An Ultra-Lightweight Block Cipher | 2008-09-16 | Paper |
Improved Side-Channel Collision Attacks on AES | 2008-03-25 | Paper |
Classification of $k$-tangle projections using cascade representation | 2007-12-22 | Paper |