Publication | Date of Publication | Type |
---|
RAMus- a new lightweight block cipher for RAM encryption | 2023-07-25 | Paper |
Differential cryptanalysis in the fixed-key model | 2023-06-30 | Paper |
A bit-vector differential model for the modular addition by a constant | 2023-03-21 | Paper |
A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis | 2022-08-04 | Paper |
On the Sixth International Olympiad in Cryptography NSUCRYPTO | 2022-07-15 | Paper |
Cryptanalysis of the permutation based algorithm SpoC | 2022-07-06 | Paper |
Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK | 2021-09-06 | Paper |
Rotational cryptanalysis on MAC algorithm chaskey | 2021-02-23 | Paper |
PROBLEMS, SOLUTIONS AND EXPERIENCE OF THE FIRST INTERNATIONAL STUDENT’S OLYMPIAD IN CRYPTOGRAPHY | 2021-02-15 | Paper |
The phantom of differential characteristics | 2020-10-21 | Paper |
The design of Rijndael. The Advanced Encryption Standard (AES) | 2020-07-20 | Paper |
Revisiting the wrong-key-randomization hypothesis | 2020-04-28 | Paper |
Correlation Distribution Analysis of a Two-Round Key-Alternating Block Cipher | 2019-09-30 | Paper |
Decomposition of permutations in a finite field | 2019-05-15 | Paper |
Constructions of S-boxes with uniform sharing | 2019-05-15 | Paper |
A new matrix form to generate all \(3\times 3\) involutory MDS matrices over \(\mathbb{F}_{2^m}\) | 2019-05-10 | Paper |
Nonlinear diffusion layers | 2018-10-10 | Paper |
New observations on invariant subspace attack | 2018-07-17 | Paper |
A family of trapdoor ciphers | 2018-05-09 | Paper |
The block cipher Square | 2018-05-09 | Paper |
On the Design and Security of RC2 | 2018-05-09 | Paper |
Differential Cryptanalysis of the ICE Encryption Algorithm | 2018-05-09 | Paper |
Masking AES with \(d+1\) shares in hardware | 2018-02-14 | Paper |
The cipher SHARK | 2017-11-15 | Paper |
Low-Data Complexity Attacks on AES | 2017-06-08 | Paper |
A new counting method to bound the number of active S-boxes in Rijndael and 3D | 2017-04-13 | Paper |
On Linear Hulls and Trails | 2016-12-21 | Paper |
New Insights on AES-Like SPN Ciphers | 2016-11-30 | Paper |
Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey | 2016-10-04 | Paper |
Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis | 2016-09-09 | Paper |
Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis | 2015-12-10 | Paper |
Extracts from the SHA-3 Competition | 2015-12-04 | Paper |
Threshold implementations of small S-boxes | 2015-11-18 | Paper |
CIPHERTEXT-ONLY ATTACK ON AKELARRE | 2015-11-13 | Paper |
ALE: AES-Based Lightweight Authenticated Encryption | 2015-09-18 | Paper |
Collision Attack on 5 Rounds of Grøstl | 2015-09-18 | Paper |
A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT | 2015-09-18 | Paper |
Cryptanalysis of Reduced-Round SIMON32 and SIMON48 | 2015-09-10 | Paper |
The rebound attack and subspace distinguishers: application to Whirlpool | 2015-05-12 | Paper |
Higher-Order Threshold Implementations | 2015-01-06 | Paper |
Collision Attack on the Hamsi-256 Compression Function | 2014-08-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q5495952 | 2014-08-07 | Paper |
A More Efficient AES Threshold Implementation | 2014-06-24 | Paper |
Linear hulls with correlation zero and linear cryptanalysis of block ciphers | 2014-03-17 | Paper |
Key Difference Invariant Bias in Block Ciphers | 2013-12-10 | Paper |
Improved Impossible Differential Attacks on Large-Block Rijndael | 2013-06-04 | Paper |
Differential Analysis of the LED Block Cipher | 2013-03-19 | Paper |
Collisions for the WIDEA-8 Compression Function | 2013-03-18 | Paper |
Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes | 2012-11-13 | Paper |
Memoryless near-collisions via coding theory | 2012-02-15 | Paper |
Secure hardware implementation of nonlinear functions in the presence of glitches | 2012-01-18 | Paper |
Optimal Covering Codes for Finding Near-Collisions | 2011-03-15 | Paper |
Improved Impossible Differential Cryptanalysis of 7-Round AES-128 | 2010-12-07 | Paper |
Whirlwind: a new cryptographic hash function | 2010-09-16 | Paper |
Rebound Attack on Reduced-Round Versions of JH | 2010-07-13 | Paper |
Rotation symmetry in algebraically generated cryptographic substitution tables | 2010-04-19 | Paper |
Numerical solvers and cryptanalysis | 2010-02-05 | Paper |
Rebound Distinguishers: Results on the Full Whirlpool Compression Function | 2009-12-15 | Paper |
New criteria for linear maps in AES-like ciphers | 2009-10-26 | Paper |
Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers | 2009-08-10 | Paper |
Analysis of Step-Reduced SHA-256 | 2009-04-02 | Paper |
The Impact of Carries on the Complexity of Collision Attacks on SHA-1 | 2009-04-02 | Paper |
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches | 2009-03-24 | Paper |
Second Preimages for Iterated Hash Functions and Their Implications on MACs | 2009-03-06 | Paper |
Analysis of the Hash Function Design Strategy Called SMASH | 2009-02-24 | Paper |
Understanding Two-Round Differentials in AES | 2008-11-27 | Paper |
Using Normal Bases for Compact Hardware Implementations of the AES S-Box | 2008-11-20 | Paper |
Threshold Implementations Against Side-Channel Attacks and Glitches | 2008-11-11 | Paper |
On the Collision Resistance of RIPEMD-160 | 2008-06-17 | Paper |
Correlated Keystreams in Moustique | 2008-06-13 | Paper |
Cryptanalysis of the Tiger Hash Function | 2008-05-15 | Paper |
Known-Key Distinguishers for Some Block Ciphers | 2008-05-15 | Paper |
Colliding Message Pair for 53-Step HAS-160 | 2008-05-06 | Paper |
Weaknesses in the HAS-V Compression Function | 2008-05-06 | Paper |
Second Preimages for SMASH | 2008-04-17 | Paper |
Update on Tiger | 2008-04-11 | Paper |
On Authentication with HMAC and Non-random Properties | 2008-03-07 | Paper |
Probability distributions of correlation and differentials in block ciphers | 2008-02-21 | Paper |
Breaking a New Hash Function Design Strategy Called SMASH | 2007-11-15 | Paper |
Impact of Rotations in SHA-1 and Related Hash Functions | 2007-11-15 | Paper |
Cryptography and Coding | 2006-11-01 | Paper |
Fast Software Encryption | 2006-06-22 | Paper |
Fast Software Encryption | 2006-06-22 | Paper |
Topics in Cryptology – CT-RSA 2005 | 2005-12-08 | Paper |
Advanced Encryption Standard – AES | 2005-09-14 | Paper |
Producing Collisions for PANAMA | 2004-08-12 | Paper |
Differential Cryptanalysis of Q | 2004-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4737238 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4417387 | 2003-07-29 | Paper |
The Wide Trail Design Strategy | 2002-11-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4421641 | 2002-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q2760977 | 2001-12-17 | Paper |
Linear frameworks for block ciphers | 2001-02-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4502735 | 2000-11-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4502483 | 2000-10-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4484896 | 2000-06-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4484897 | 2000-06-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4941802 | 2000-03-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4941805 | 2000-03-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250827 | 2000-02-01 | Paper |
Analysis Methods for (Alleged) RC4 | 1999-06-17 | Paper |
On weaknesses of non-surjective round functions | 1998-01-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341749 | 1997-06-18 | Paper |