Eik List

From MaRDI portal
Person:680938

Available identifiers

zbMath Open list.eikMaRDI QIDQ680938

List of research outcomes





PublicationDate of PublicationType
Diving deep into the preimage security of AES-like hashing2024-11-12Paper
On the security of triplex- and multiplex-type constructions with smaller tweaks2024-10-23Paper
Implicit key-stretching security of encryption schemes2023-08-21Paper
Towards closing the security gap of Tweak-aNd-Tweak (TNT)2023-03-21Paper
Pholkos -- efficient large-state tweakable block ciphers from the AES round function2022-07-06Paper
Related-key impossible-differential attack on reduced-round \textsc{Skinny}2022-07-01Paper
\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption2022-06-15Paper
\(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations2022-06-08Paper
The Oribatida v1.3 family of lightweight authenticated encryption schemes2021-07-14Paper
XHX -- a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing2020-03-02Paper
Parallelizable MACs based on the sum of PRPs with security beyond the birthday bound2020-01-30Paper
Cryptanalysis of ForkAES2020-01-30Paper
ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls2018-12-20Paper
Rasta: a cipher with low ANDdepth and few ANDs per bit2018-09-12Paper
Differential cryptanalysis of round-reduced \textsc{Sparx}-64/1282018-08-10Paper
RIV for robust authenticated encryption2018-05-09Paper
\textsc{POEx}: a beyond-birthday-bound-secure on-line cipher2018-01-29Paper
Reforgeability of authenticated encryption schemes2017-08-25Paper
Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption2017-04-12Paper
Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC2017-04-12Paper
Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch2016-09-02Paper
Pipelineable on-line encryption2015-09-18Paper
A framework for automated independent-biclique cryptanalysis2015-09-18Paper
Differential cryptanalysis of round-reduced \textsc{Simon} and \textsc{Speck}2015-09-18Paper
Counter-\(b\)DM: a provably secure family of multi-block-length compression functions2014-06-24Paper
Mars attacks! revisited: differential attack on 12 rounds of the MARS core and defeating the complex MARS key-schedule2011-12-16Paper

Research outcomes over time

This page was built for person: Eik List