Ivica Nikolić

From MaRDI portal
Person:744346

Available identifiers

zbMath Open nikolic.ivicaMaRDI QIDQ744346

List of research outcomes

PublicationDate of PublicationType
The \texttt{Deoxys} AEAD family2021-08-10Paper
Efficient Design Strategies Based on the AES Round Function2018-05-09Paper
How to use metaheuristics for design of symmetric-key primitives2018-02-23Paper
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem2017-02-01Paper
Extended meet-in-the-middle attacks on some Feistel constructions2016-07-21Paper
Colliding Keys for SC2000-2562016-04-13Paper
Practical Cryptanalysis of PAES2016-04-13Paper
Refinements of the k-tree Algorithm for the Generalized Birthday Problem2016-03-23Paper
The parallel-cut meet-in-the-middle attack2015-11-19Paper
Complementing Feistel Ciphers2015-09-18Paper
Security Analysis of PRINCE2015-09-18Paper
Cryptanalysis of Round-Reduced $$\mathtt{LED}$$2015-09-18Paper
Rotational Cryptanalysis of ARX Revisited2015-09-18Paper
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- $$f$$ f Permutation2015-09-18Paper
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-1282015-01-16Paper
Meet-in-the-Middle Attacks on Generic Feistel Constructions2015-01-16Paper
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework2015-01-06Paper
Rotational rebound attacks on reduced Skein2014-09-25Paper
The resistance of PRESENT-80 against related-key differential attacks2014-06-20Paper
Analysis of BLAKE22014-03-28Paper
Second-Order Differential Collisions for Reduced SHA-2562011-12-02Paper
Known and Chosen Key Differential Distinguishers for Block Ciphers2011-10-27Paper
Search for Related-Key Differential Characteristics in DES-Like Ciphers2011-07-07Paper
Boomerang Attacks on BLAKE-322011-07-07Paper
Tweaking AES2011-03-15Paper
Rotational Rebound Attacks on Reduced Skein2010-12-07Paper
Rotational Cryptanalysis of ARX2010-07-13Paper
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others2010-06-01Paper
Rebound Attack on the Full Lane Compression Function2009-12-15Paper
Distinguisher and Related-Key Attack on the Full AES-2562009-10-20Paper
Cryptanalysis of the LAKE Hash Family2009-08-11Paper
Meet-in-the-Middle Attacks on SHA-3 Candidates2009-08-11Paper
Speeding up Collision Search for Byte-Oriented Hash Functions2009-04-29Paper
Collisions for Step-Reduced SHA-2562008-09-18Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Ivica Nikolić