Publication | Date of Publication | Type |
---|
Analysis and probing of parallel channels in the lightning network | 2023-05-26 | Paper |
Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX) | 2022-12-07 | Paper |
Dynamic universal accumulator with batch update over bilinear groups | 2022-07-06 | Paper |
Cryptanalysis of a dynamic universal accumulator over bilinear groups | 2021-12-20 | Paper |
Dummy shuffling against algebraic attacks in white-box implementations | 2021-12-08 | Paper |
On degree-\(d\) zero-sum sets of full rank | 2020-09-30 | Paper |
Attacks and countermeasures for white-box designs | 2019-01-23 | Paper |
Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck | 2018-05-09 | Paper |
Symmetrically and asymmetrically hard cryptography | 2018-02-23 | Paper |
Design Strategies for ARX with Provable Bounds: Sparx and LAX | 2017-02-01 | Paper |
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem | 2016-10-27 | Paper |
Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice | 2016-10-04 | Paper |
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 | 2016-09-09 | Paper |
Cryptanalysis of Feistel Networks with Secret Round Functions | 2016-05-19 | Paper |
Colliding Keys for SC2000-256 | 2016-04-13 | Paper |
Tradeoff Cryptanalysis of Memory-Hard Functions | 2016-03-23 | Paper |
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure | 2015-12-10 | Paper |
Cryptanalysis of the “Kindle” Cipher | 2015-12-04 | Paper |
Cryptanalysis of the Loiss Stream Cipher | 2015-12-04 | Paper |
PAEQ: Parallelizable Permutation-Based Authenticated Encryption | 2015-11-03 | Paper |
Complementing Feistel Ciphers | 2015-09-18 | Paper |
Differential Analysis of Block Ciphers SIMON and SPECK | 2015-09-18 | Paper |
Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE | 2015-09-18 | Paper |
Differential entropy analysis of the IDEA block cipher | 2015-06-17 | Paper |
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract) | 2015-01-16 | Paper |
Automatic Search for Differential Trails in ARX Ciphers | 2014-03-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q2883168 | 2012-05-11 | Paper |
Second-Order Differential Collisions for Reduced SHA-256 | 2011-12-02 | Paper |
Search for Related-Key Differential Characteristics in DES-Like Ciphers | 2011-07-07 | Paper |
Boomerang Attacks on BLAKE-32 | 2011-07-07 | Paper |
Structural cryptanalysis of SASAS | 2010-11-12 | Paper |
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G ⊕ | 2010-07-06 | Paper |
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds | 2010-06-01 | Paper |
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others | 2010-06-01 | Paper |
Advances in Cryptology - ASIACRYPT 2003 | 2010-01-05 | Paper |
Fast Software Encryption | 2010-01-05 | Paper |
Fast Software Encryption | 2010-01-05 | Paper |
Related-Key Cryptanalysis of the Full AES-192 and AES-256 | 2009-12-15 | Paper |
Distinguisher and Related-Key Attack on the Full AES-256 | 2009-10-20 | Paper |
Cryptanalysis of the LAKE Hash Family | 2009-08-11 | Paper |
Speeding up Collision Search for Byte-Oriented Hash Functions | 2009-04-29 | Paper |
Slid Pairs in Salsa20 and Trivium | 2009-01-22 | Paper |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract) | 2008-11-27 | Paper |
Collisions for Step-Reduced SHA-256 | 2008-09-18 | Paper |
Two Trivial Attacks on Trivium | 2008-03-25 | Paper |
The Design of a Stream Cipher LEX | 2007-11-29 | Paper |
Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
Improved Time-Memory Trade-Offs with Multiple Data | 2007-11-15 | Paper |
Analysis of a SHA-256 Variant | 2007-11-15 | Paper |
Information and Communications Security | 2006-10-24 | Paper |
Security in Communication Networks | 2006-10-10 | Paper |
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials | 2006-08-14 | Paper |
Fast Software Encryption | 2006-06-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q3374941 | 2006-03-01 | Paper |
Selected Areas in Cryptography | 2005-12-27 | Paper |
Selected Areas in Cryptography | 2005-12-27 | Paper |
Advanced Encryption Standard – AES | 2005-09-14 | Paper |
Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4434867 | 2003-11-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4428360 | 2003-09-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q4537979 | 2002-10-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q2778859 | 2002-03-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q2707396 | 2001-07-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4941816 | 2000-08-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4941808 | 2000-03-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249322 | 2000-03-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250830 | 2000-02-01 | Paper |
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials | 1999-10-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249630 | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4365768 | 1997-11-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4342474 | 1997-11-02 | Paper |
An improvement of Davies' attack on DES | 1997-08-28 | Paper |