Highly Secure Nonce-Based Macs From The Sum Of Tweakable Block Ciphers | 0 | 0.34 | 2020 |
Pholkos - Efficient Large-State Tweakable Block Ciphers from the AES Round Function | 0 | 0.34 | 2020 |
Extended Truncated-Differential Distinguishers On Round-Reduced Aes | 0 | 0.34 | 2020 |
Dovemac: A Tbc-Based Prf With Smaller State, Full Security, And High Rate | 0 | 0.34 | 2019 |
Extended Expectation Cryptanalysis on Round-reduced AES. | 0 | 0.34 | 2019 |
SecuriCast: zero-touch two-factor authentication using WebBluetooth. | 0 | 0.34 | 2019 |
Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound. | 1 | 0.35 | 2019 |
Cryptanalysis of ForkAES. | 0 | 0.34 | 2019 |
ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-block-cipher Calls. | 0 | 0.34 | 2018 |
Rasta: A cipher with low ANDdepth and few ANDs per bit. | 3 | 0.42 | 2018 |
POEx: A beyond-birthday-bound-secure on-line cipher | 1 | 0.35 | 2018 |
Rectangle and Impossible-differential Cryptanalysis on Versions of ForkAES. | 0 | 0.34 | 2018 |
Differential Cryptanalysis of Round-Reduced Sparx-64/128. | 1 | 0.35 | 2018 |
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC. | 0 | 0.34 | 2017 |
XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing. | 0 | 0.34 | 2017 |
Critical Graphs for Minimum Vertex Cover. | 0 | 0.34 | 2017 |
Passphone: Outsourcing Phone-Based Web Authentication While Protecting User Privacy. | 0 | 0.34 | 2017 |
Related-Key Impossible-Differential Attack on Reduced-Round SKINNY. | 4 | 0.58 | 2017 |
Zmac(+)- An Efficient Variable-Output-Length Variant Of Zmac | 0 | 0.34 | 2017 |
Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption. | 8 | 0.49 | 2017 |
RIV for Robust Authenticated Encryption. | 2 | 0.37 | 2016 |
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch. | 3 | 0.37 | 2016 |
Overview of the Candidates for the Password Hashing Competition - And their Resistance against Garbage-Collector Attacks. | 4 | 0.51 | 2014 |
Differential Cryptanalysis of Round-Reduced Simon and Speck. | 38 | 1.57 | 2014 |
Pipelineable On-line Encryption. | 21 | 0.84 | 2014 |
A Framework for Automated Independent-Biclique Cryptanalysis. | 3 | 0.41 | 2013 |
Differential Cryptanalysis of Reduced-Round Simon. | 0 | 0.34 | 2013 |
Cryptanalysis of the Speck Family of Block Ciphers. | 2 | 0.38 | 2013 |
Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers. | 9 | 0.63 | 2012 |
On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis. | 9 | 0.62 | 2012 |
Mars attacks! revisited: differential attack on 12 rounds of the MARS core and defeating the complex MARS key-schedule | 2 | 0.38 | 2011 |