The following pages link to Ivica Nikolić (Q744346):
Displayed 34 items.
- Rotational rebound attacks on reduced Skein (Q744348) (← links)
- The parallel-cut meet-in-the-middle attack (Q892391) (← links)
- How to use metaheuristics for design of symmetric-key primitives (Q1701452) (← links)
- The resistance of PRESENT-80 against related-key differential attacks (Q2016426) (← links)
- The \texttt{Deoxys} AEAD family (Q2044756) (← links)
- Extended meet-in-the-middle attacks on some Feistel constructions (Q2630716) (← links)
- Refinements of the k-tree Algorithm for the Generalized Birthday Problem (Q2795995) (← links)
- Colliding Keys for SC2000-256 (Q2798605) (← links)
- Practical Cryptanalysis of PAES (Q2798616) (← links)
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework (Q2936613) (← links)
- Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128 (Q2938842) (← links)
- Meet-in-the-Middle Attacks on Generic Feistel Constructions (Q2938859) (← links)
- Complementing Feistel Ciphers (Q2946868) (← links)
- Security Analysis of PRINCE (Q2946873) (← links)
- Cryptanalysis of Round-Reduced $$\mathtt{LED}$$ (Q2946874) (← links)
- Rotational Cryptanalysis of ARX Revisited (Q2946961) (← links)
- Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- $$f$$ f Permutation (Q2946962) (← links)
- A New Algorithm for the Unbalanced Meet-in-the-Middle Problem (Q2958141) (← links)
- Search for Related-Key Differential Characteristics in DES-Like Ciphers (Q3013075) (← links)
- Boomerang Attacks on BLAKE-32 (Q3013086) (← links)
- Rotational Rebound Attacks on Reduced Skein (Q3058646) (← links)
- Tweaking AES (Q3084255) (← links)
- Known and Chosen Key Differential Distinguishers for Block Ciphers (Q3094983) (← links)
- Second-Order Differential Collisions for Reduced SHA-256 (Q3102192) (← links)
- Distinguisher and Related-Key Attack on the Full AES-256 (Q3183567) (← links)
- Cryptanalysis of the LAKE Hash Family (Q3391569) (← links)
- Meet-in-the-Middle Attacks on SHA-3 Candidates (Q3391573) (← links)
- Collisions for Step-Reduced SHA-256 (Q3525658) (← links)
- Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others (Q3563843) (← links)
- Rotational Cryptanalysis of ARX (Q3577969) (← links)
- Speeding up Collision Search for Byte-Oriented Hash Functions (Q3623043) (← links)
- Rebound Attack on the Full Lane Compression Function (Q3650688) (← links)
- Efficient Design Strategies Based on the AES Round Function (Q4639487) (← links)
- Analysis of BLAKE2 (Q5404764) (← links)