Eik List

From MaRDI portal
Person:680938

Available identifiers

zbMath Open list.eikMaRDI QIDQ680938

List of research outcomes





PublicationDate of PublicationType
Diving deep into the preimage security of AES-like hashing2024-11-12Paper
On the security of triplex- and multiplex-type constructions with smaller tweaks2024-10-23Paper
Implicit key-stretching security of encryption schemes2023-08-21Paper
Towards closing the security gap of Tweak-aNd-Tweak (TNT)2023-03-21Paper
Pholkos -- efficient large-state tweakable block ciphers from the AES round function2022-07-06Paper
Related-Key Impossible-Differential Attack on Reduced-Round Skinny2022-07-01Paper
\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption2022-06-15Paper
\(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations2022-06-08Paper
The Oribatida v1.3 family of lightweight authenticated encryption schemes2021-07-14Paper
XHX -- a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing2020-03-02Paper
Parallelizable MACs based on the sum of PRPs with security beyond the birthday bound2020-01-30Paper
Cryptanalysis of ForkAES2020-01-30Paper
ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls2018-12-20Paper
Rasta: a cipher with low ANDdepth and few ANDs per bit2018-09-12Paper
Differential cryptanalysis of round-reduced \textsc{Sparx}-64/1282018-08-10Paper
RIV for Robust Authenticated Encryption2018-05-09Paper
\textsc{POEx}: a beyond-birthday-bound-secure on-line cipher2018-01-29Paper
Reforgeability of authenticated encryption schemes2017-08-25Paper
Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption2017-04-12Paper
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC2017-04-12Paper
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch2016-09-02Paper
Pipelineable On-line Encryption2015-09-18Paper
A Framework for Automated Independent-Biclique Cryptanalysis2015-09-18Paper
Differential Cryptanalysis of Round-Reduced Simon and Speck2015-09-18Paper
Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions2014-06-24Paper
Mars Attacks! Revisited:2011-12-16Paper

Research outcomes over time

This page was built for person: Eik List