Publication | Date of Publication | Type |
---|
Revisiting the indifferentiability of the sum of permutations | 2024-02-02 | Paper |
Security of truncated permutation without initial value | 2023-08-16 | Paper |
Tight preimage resistance of the sponge construction | 2023-07-07 | Paper |
The Relation Between CENC and NEMO | 2023-06-28 | Paper |
Categorization of faulty nonce misuse resistant message authentication | 2023-05-12 | Paper |
Beyond birthday bound secure fresh rekeying: application to authenticated encryption | 2023-03-21 | Paper |
The summation-truncation hybrid: reusing discarded bits for free | 2022-11-09 | Paper |
Collapseability of Tree Hashes | 2022-10-13 | Paper |
Leakage resilient value comparison with application to message authentication | 2021-12-08 | Paper |
On the resilience of Even-Mansour to invariant permutations | 2021-05-10 | Paper |
Practical forgeries for ORANGE | 2020-08-04 | Paper |
How to build pseudorandom functions from public random permutations | 2020-05-20 | Paper |
Leakage resilience of the duplex construction | 2020-05-11 | Paper |
Linking Stam's bounds with generalized truncation | 2020-01-28 | Paper |
Beyond conventional security in sponge-based authenticated encryption modes | 2019-08-13 | Paper |
Short variable length domain extenders with beyond birthday bound security | 2018-12-20 | Paper |
Towards tight security of cascaded LRW2 | 2018-12-06 | Paper |
Recipient privacy in online social networks (short paper) | 2018-10-24 | Paper |
Damaging, simplifying, and salvaging p-OMD | 2018-10-18 | Paper |
XOR of PRPs in a quantum world | 2018-09-12 | Paper |
Connecting tweakable and multi-key blockcipher security | 2018-04-06 | Paper |
Analyzing multi-key security degradation | 2018-03-08 | Paper |
Full-state keyed duplex with built-in multi-user support | 2018-03-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4602284 | 2018-01-09 | Paper |
Insuperability of the standard versus ideal model gap for tweakable blockcipher security | 2017-11-15 | Paper |
Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory | 2017-10-27 | Paper |
Optimal collision security in double block length hashing with single length key | 2017-04-13 | Paper |
Weak Keys for AEZ, and the External Key Padding Attack | 2017-04-12 | Paper |
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees | 2016-11-30 | Paper |
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption | 2016-09-09 | Paper |
Forgery and Subkey Recovery on CAESAR Candidate iFeed | 2016-05-19 | Paper |
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers | 2016-04-13 | Paper |
On the Impact of Known-Key Attacks on Hash Functions | 2016-03-23 | Paper |
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption | 2016-03-23 | Paper |
On the XOR of Multiple Random Permutations | 2016-03-10 | Paper |
Provable Security of BLAKE with Non-ideal Compression Function | 2015-12-04 | Paper |
Open problems in hash function security | 2015-10-26 | Paper |
Two-permutation-based hashing with binary mixing | 2015-10-13 | Paper |
Towards Understanding the Known-Key Security of Block Ciphers | 2015-09-18 | Paper |
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography | 2015-09-18 | Paper |
COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse | 2015-09-18 | Paper |
Security of Keyed Sponge Constructions Using a Modular Proof Approach | 2015-09-18 | Paper |
Optimally Secure Tweakable Blockciphers | 2015-09-18 | Paper |
Breaking and Fixing Cryptophia’s Short Combiner | 2015-02-10 | Paper |
Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes | 2015-01-16 | Paper |
How to Securely Release Unverified Plaintext in Authenticated Encryption | 2015-01-16 | Paper |
The Security of Multiple Encryption in the Ideal Cipher Model | 2014-08-07 | Paper |
On the collision and preimage security of MDC-4 in the ideal cipher model | 2014-08-01 | Paper |
Indifferentiability of Double Length Compression Functions | 2014-01-17 | Paper |
Parallelizable and Authenticated Online Ciphers | 2013-12-10 | Paper |
On the Indifferentiability of Key-Alternating Ciphers | 2013-09-02 | Paper |
Optimal Collision Security in Double Block Length Hashing with Single Length Key | 2013-03-19 | Paper |
Hash Functions Based on Three Permutations: A Generic Security Analysis | 2012-09-25 | Paper |
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein | 2012-07-23 | Paper |
Provable Chosen-Target-Forced-Midfix Preimage Resistance | 2012-06-08 | Paper |
Increasing the flexibility of the herding attack | 2012-03-09 | Paper |
Security Reductions of the Second Round SHA-3 Candidates | 2011-02-11 | Paper |
Anonymous Credential Schemes with Encrypted Attributes | 2010-12-07 | Paper |
On the Indifferentiability of the Grøstl Hash Function | 2010-09-10 | Paper |