| Publication | Date of Publication | Type |
|---|
The design and evolution of OCB Journal of Cryptology | 2021-09-10 | Paper |
An obsession with definitions | 2020-03-02 | Paper |
Simplifying game-based definitions -- indistinguishability up to correctness and its application to stateful AE | 2018-09-26 | Paper |
Deterministic encryption with the Thorp shuffle Journal of Cryptology | 2018-05-28 | Paper |
Big-key symmetric encryption: resisting key exfiltration Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
Augmented secure channels and the goal of the TLS 1.3 record layer Provable Security | 2016-01-27 | Paper |
Robust authenticated encryption and the limits of symmetric cryptography Cryptography and Coding | 2016-01-12 | Paper |
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance Lecture Notes in Computer Science | 2015-12-10 | Paper |
How to Protect DES Against Exhaustive Key Search Advances in Cryptology — CRYPTO ’96 | 2015-11-11 | Paper |
Robust authenticated-encryption AEZ and the problem that it solves Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Formalizing human ignorance Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
The exact security of digital signatures -- how to sign with RSA and Rabin Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
Security of symmetric encryption against mass surveillance Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Reconsidering generic composition Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Sometimes-recurse shuffle. Almost-random permutations in logarithmic expected time Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
The Security of Ciphertext Stealing Fast Software Encryption | 2013-01-08 | Paper |
An enciphering scheme based on a card shuffle Lecture Notes in Computer Science | 2012-09-25 | Paper |
The software performance of authenticated-encryption modes Fast Software Encryption | 2011-07-07 | Paper |
Online ciphers from tweakable blockciphers Topics in Cryptology – CT-RSA 2011 | 2011-02-11 | Paper |
An analysis of the blockcipher-based hash functions from PGV Journal of Cryptology | 2010-11-12 | Paper |
On generalized Feistel networks Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Variationally universal hashing Information Processing Letters | 2010-01-29 | Paper |
Format-preserving encryption Selected Areas in Cryptography | 2009-12-09 | Paper |
How to Encipher Messages on a Small Domain Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
Topics in Cryptology – CT-RSA 2004 Lecture Notes in Computer Science | 2009-05-07 | Paper |
Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Lecture Notes in Computer Science | 2009-02-10 | Paper |
How to Enrich the Message Space of a Cipher Fast Software Encryption | 2008-09-16 | Paper |
Security/Efficiency Tradeoffs for Permutation-Based Hashing Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
Improved Security Analyses for CBC MACs Advances in Cryptology – CRYPTO 2005 | 2008-03-17 | Paper |
Advances in Cryptology - CRYPTO 2003 Lecture Notes in Computer Science | 2007-11-28 | Paper |
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
A Provable-Security Treatment of the Key-Wrap Problem Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Authenticated key exchange secure against dictionary attacks | 2006-03-01 | Paper |
CBC MACs for arbitrary-length messages: The three-key constructions Journal of Cryptology | 2006-02-08 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making Lecture Notes in Computer Science | 2005-08-17 | Paper |
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC | 2005-08-12 | Paper |
scientific article; zbMATH DE number 2086719 (Why is no real title available?) | 2004-08-11 | Paper |
scientific article; zbMATH DE number 2079924 (Why is no real title available?) | 2004-08-03 | Paper |
scientific article; zbMATH DE number 1951605 (Why is no real title available?) | 2003-07-21 | Paper |
scientific article; zbMATH DE number 1942429 (Why is no real title available?) | 2003-06-30 | Paper |
scientific article; zbMATH DE number 1759457 (Why is no real title available?) | 2002-11-25 | Paper |
scientific article; zbMATH DE number 1303128 (Why is no real title available?) | 2002-10-08 | Paper |
scientific article; zbMATH DE number 1759779 (Why is no real title available?) | 2002-10-07 | Paper |
scientific article; zbMATH DE number 1617924 (Why is no real title available?) | 2002-09-01 | Paper |
Reconciling two views of cryptography (The computational soundness of formal encryption) Journal of Cryptology | 2002-06-27 | Paper |
scientific article; zbMATH DE number 1689861 (Why is no real title available?) | 2002-01-14 | Paper |
The complexity of approximating a nonlinear program | 2001-09-18 | Paper |
The security of the cipher block chaining message authentication code Journal of Computer and System Sciences | 2001-04-17 | Paper |
scientific article; zbMATH DE number 1583788 (Why is no real title available?) | 2001-04-03 | Paper |
How to protect DES against exhaustive key search (an analysis of DESX). Journal of Cryptology | 2001-01-01 | Paper |
A software-optimized encryption algorithm Fast Software Encryption | 2000-08-30 | Paper |
scientific article; zbMATH DE number 1418297 (Why is no real title available?) | 2000-07-26 | Paper |
Bucket hashing and its application to fast message authentication Journal of Cryptology | 2000-06-06 | Paper |
scientific article; zbMATH DE number 1418256 (Why is no real title available?) | 2000-03-19 | Paper |
scientific article; zbMATH DE number 1406792 (Why is no real title available?) | 2000-03-01 | Paper |
scientific article; zbMATH DE number 1263181 (Why is no real title available?) | 1999-07-22 | Paper |
scientific article; zbMATH DE number 1302836 (Why is no real title available?) | 1999-06-17 | Paper |
A software-optimized encryption algorithm Journal of Cryptology | 1999-05-05 | Paper |
scientific article; zbMATH DE number 1107669 (Why is no real title available?) | 1998-06-07 | Paper |
scientific article; zbMATH DE number 1088254 (Why is no real title available?) | 1998-03-10 | Paper |
scientific article; zbMATH DE number 1088907 (Why is no real title available?) | 1998-02-19 | Paper |
scientific article; zbMATH DE number 1030978 (Why is no real title available?) | 1997-11-23 | Paper |
scientific article; zbMATH DE number 1024060 (Why is no real title available?) | 1997-09-24 | Paper |
scientific article; zbMATH DE number 1030979 (Why is no real title available?) | 1997-07-06 | Paper |
Locally random reductions: Improvements and applications Journal of Cryptology | 1997-05-28 | Paper |
The complexity of approximating a nonlinear program Mathematical Programming. Series A. Series B | 1996-02-12 | Paper |
scientific article; zbMATH DE number 503242 (Why is no real title available?) | 1994-03-07 | Paper |
scientific article; zbMATH DE number 4185024 (Why is no real title available?) | 1990-01-01 | Paper |