Name
Papers
Collaborators
JOHN P. STEINBERGER
31
32
Citations 
PageRank 
Referers 
329
18.30
305
Referees 
References 
383
479
Search Limit
100383
Title
Citations
PageRank
Year
Random Oracles and Non-Uniformity.60.412018
Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks.10.342018
PPSZ for General k-SAT - Making Hertli's Analysis Simpler and 3-SAT Faster.10.372017
Provable Security of Substitution-Permutation Networks.00.342017
Five Rounds are Sufficient and Necessary for the Indifferentiability of Iterated Even-Mansour.00.342017
Indifferentiability of Iterated Even-Mansour Ciphers with Non-idealized Key-Schedules: Five Rounds Are Necessary and Sufficient.10.342017
The Security of Tandem-DM in the Ideal Cipher Model.10.372017
Indifferentiability of Confusion-Diffusion Networks.30.372016
Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN.30.372016
Indifferentiability of 8-Round Feistel Networks.60.422016
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes30.392015
Indifferentiability of Confusion-Diffusion Networks.00.342015
Feistel Networks: Indifferentiability at 8 Rounds.00.342015
Feistel Networks: Indifferentiability at 10 Rounds.00.342015
The Security of Multiple Encryption in the Ideal Cipher Model.100.522014
Minimizing the Two-Round Even-Mansour Cipher.581.362014
Tight security bounds for multiple encryption.40.412014
Counting solutions to additive equations in random sets.20.392013
On the Indifferentiability of Key-Alternating Ciphers.300.822013
The Distinguishability of Product Distributions by Read-Once Branching Programs.50.452013
Tight security bounds for key-alternating ciphers.631.482013
Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation70.482012
Stam's Conjecture and Threshold Phenomena in Collision Resistance.60.422012
Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations - (Extended Abstract).311.022012
Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance.260.892012
The Lowest-Degree Polynomial with Nonnegative Coefficients Divisible by the n-th Cyclotomic Polynomial.00.342012
Stam’s collision resistance conjecture100.562010
Tilings of the integers can have superpolynomial periods00.342009
The Collision Intractability of MDC-2 in the Ideal-Cipher Model492.712007
Indecomposable Tilings of the Integers with Exponentially Long Periods10.432005
A class of prototiles with doubly generated level semigroups20.622004