The following pages link to Stefan Lucks (Q680939):
Displayed 50 items.
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher (Q680941) (← links)
- Pseudorandom functions in \(\text{TC}^0\) and cryptographic limitations to proving lower bounds (Q1405738) (← links)
- New second preimage attacks on dithered hash functions with low memory complexity (Q1698640) (← links)
- Reforgeability of authenticated encryption schemes (Q2014604) (← links)
- Pholkos -- efficient large-state tweakable block ciphers from the AES round function (Q2152178) (← links)
- Cryptanalysis of ForkAES (Q2291377) (← links)
- (Q2762792) (← links)
- (Q2771759) (← links)
- Hash Functions from Defective Ideal Ciphers (Q2790047) (← links)
- Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch (Q2817821) (← links)
- Improved Authenticity Bound of EAX, and Refinements (Q2856165) (← links)
- The Collision Security of MDC-4 (Q2900624) (← links)
- Weimar-DM: A Highly Secure Double-Length Compression Function (Q2907369) (← links)
- ${\Gamma\mbox{-MAC}\lbrack H,P\rbrack}$ - A New Universal MAC Scheme (Q2920413) (← links)
- Memory-Demanding Password Scrambling (Q2936614) (← links)
- Attacks and Security Proofs of EAX-Prime (Q2946885) (← links)
- A Framework for Automated Independent-Biclique Cryptanalysis (Q2946897) (← links)
- Pipelineable On-line Encryption (Q2946911) (← links)
- Differential Cryptanalysis of Round-Reduced Simon and Speck (Q2946927) (← links)
- The Saturation Attack — A Bait for Twofish (Q3046583) (← links)
- Bias in the LEVIATHAN Stream Cipher (Q3046607) (← links)
- New Boomerang Attacks on ARIA (Q3058723) (← links)
- Mars Attacks! Revisited: (Q3104728) (← links)
- (Q3149706) (← links)
- Some Observations on Indifferentiability (Q3163100) (← links)
- (Q3374930) (← links)
- On the Security of Tandem-DM (Q3391564) (← links)
- Slide Attacks on a Class of Hash Functions (Q3600370) (← links)
- Collisions and Near-Collisions for Reduced-Round Tiger (Q3618647) (← links)
- Attacking 9 and 10 Rounds of AES-256 (Q3634483) (← links)
- Improved Generic Algorithms for 3-Collisions (Q3650702) (← links)
- Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode (Q3652318) (← links)
- Security of Cyclic Double Block Length Hash Functions (Q3654617) (← links)
- (Q4220502) (← links)
- (Q4387316) (← links)
- A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order (Q4412787) (← links)
- (Q4484888) (← links)
- (Q4537993) (← links)
- Faster Luby-Rackoff ciphers (Q4593794) (← links)
- How traveling salespersons prove their identity (Q4608506) (← links)
- On the security of remotely keyed encryption (Q4639343) (← links)
- Attacking Triple Encryption (Q4639452) (← links)
- RIV for Robust Authenticated Encryption (Q4639469) (← links)
- (Q4736420) (← links)
- McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes (Q4899705) (← links)
- Collision Resistant Double-Length Hashing (Q4933214) (← links)
- (Q4941803) (← links)
- (Q4941807) (← links)
- Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions (Q4981783) (← links)
- Advanced Encryption Standard – AES (Q5316682) (← links)