Name
Affiliation
Papers
EIK LIST
Bauhaus Univ Weimar, D-99423 Weimar, Germany
31
Collaborators
Citations 
PageRank 
50
111
13.70
Referers 
Referees 
References 
233
409
279
Search Limit
100409
Title
Citations
PageRank
Year
Highly Secure Nonce-Based Macs From The Sum Of Tweakable Block Ciphers00.342020
Pholkos - Efficient Large-State Tweakable Block Ciphers from the AES Round Function00.342020
Extended Truncated-Differential Distinguishers On Round-Reduced Aes00.342020
Dovemac: A Tbc-Based Prf With Smaller State, Full Security, And High Rate00.342019
Extended Expectation Cryptanalysis on Round-reduced AES.00.342019
SecuriCast: zero-touch two-factor authentication using WebBluetooth.00.342019
Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound.10.352019
Cryptanalysis of ForkAES.00.342019
ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-block-cipher Calls.00.342018
Rasta: A cipher with low ANDdepth and few ANDs per bit.30.422018
POEx: A beyond-birthday-bound-secure on-line cipher10.352018
Rectangle and Impossible-differential Cryptanalysis on Versions of ForkAES.00.342018
Differential Cryptanalysis of Round-Reduced Sparx-64/128.10.352018
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC.00.342017
XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing.00.342017
Critical Graphs for Minimum Vertex Cover.00.342017
Passphone: Outsourcing Phone-Based Web Authentication While Protecting User Privacy.00.342017
Related-Key Impossible-Differential Attack on Reduced-Round SKINNY.40.582017
Zmac(+)- An Efficient Variable-Output-Length Variant Of Zmac00.342017
Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption.80.492017
RIV for Robust Authenticated Encryption.20.372016
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch.30.372016
Overview of the Candidates for the Password Hashing Competition - And their Resistance against Garbage-Collector Attacks.40.512014
Differential Cryptanalysis of Round-Reduced Simon and Speck.381.572014
Pipelineable On-line Encryption.210.842014
A Framework for Automated Independent-Biclique Cryptanalysis.30.412013
Differential Cryptanalysis of Reduced-Round Simon.00.342013
Cryptanalysis of the Speck Family of Block Ciphers.20.382013
Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers.90.632012
On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis.90.622012
Mars attacks! revisited: differential attack on 12 rounds of the MARS core and defeating the complex MARS key-schedule20.382011