[go: up one dir, main page]

Follow
Eik List
Eik List
Chair of Media Security, Bauhaus-Universität Weimar
Verified email at uni-weimar.de
Title
Cited by
Cited by
Year
Differential Cryptanalysis of Round-Reduced Simon and Speck
F Abed, E List, S Lucks, J Wenzel
International Workshop on Fast Software Encryption, 525-545, 2014
1992014
Rasta: a cipher with low ANDdepth and few ANDs per bit
C Dobraunig, M Eichlseder, L Grassi, V Lallemand, G Leander, E List, ...
Annual International Cryptology Conference, 662-692, 2018
1702018
Differential and linear cryptanalysis of reduced-round SIMON
F Abed, E List, S Lucks, J Wenzel
Cryptology ePrint Archive, 2013
752013
Pipelineable on-line encryption
F Abed, S Fluhrer, C Forler, E List, S Lucks, D McGrew, J Wenzel
International Workshop on Fast Software Encryption, 205-223, 2014
702014
Related-Key Impossible-Differential Attack on Reduced-Round Skinny
R Ankele, S Banik, A Chakraborti, E List, F Mendel, SM Sim, G Wang
International Conference on Applied Cryptography and Network Security, 208-228, 2017
582017
Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers
F Abed, C Forler, E List, S Lucks, J Wenzel
IACR Cryptology ePrint Archive 2012, 591, 2012
54*2012
Cryptanalysis of the Speck Family of Block Ciphers
F Abed, E List, S Lucks, J Wenzel
IACR Cryptology ePrint Archive 2013, 568, 2013
452013
On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis
F Abed, E List, S Lucks
IACR Cryptology ePrint Archive 2012, 712, 2012
382012
Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption
E List, M Nandi
Cryptographers’ Track at the RSA Conference, 258-274, 2017
372017
ZCZ – Achieving n-bit SPRP Security with a Minimal Number of Tweakable-Block-Cipher Calls
R Bhaumik, E List, M Nandi
International Conference on the Theory and Application of Cryptology and …, 2018
302018
The oribatida v1. 3 family of lightweight authenticated encryption schemes
A Bhattacharjee, CM López, E List, M Nandi
Journal of Mathematical Cryptology 15 (1), 305-344, 2021
282021
Differential cryptanalysis of round-reduced sparx-64/128
R Ankele, E List
International Conference on Applied Cryptography and Network Security, 459-475, 2018
272018
Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC
C Dobraunig, E List
Cryptographers’ Track at the RSA Conference, 207-222, 2017
262017
The POET Family of On-Line Authenticated Encryption Schemes
F Abed, S Fluhrer, J Foley, C Forler, E List, S Lucks, D McGrew, J Wenzel
CAESAR competition, 2014
26*2014
Overview of the Candidates for the Password Hashing Competition: And Their Resistance Against Garbage-Collector Attacks
C Forler, E List, S Lucks, J Wenzel
International Conference on Passwords, 3-18, 2014
252014
Extended truncated-differential distinguishers on round-reduced AES
Z Bao, J Guo, E List
Cryptology ePrint Archive, 2019
242019
RIV for robust authenticated encryption
F Abed, C Forler, E List, S Lucks, J Wenzel
International Conference on Fast Software Encryption, 23-42, 2016
232016
Pholkos–efficient large-state tweakable block ciphers from the AES round function
J Bossert, E List, S Lucks, S Schmitz
Cryptographers’ Track at the RSA Conference, 511-536, 2022
222022
Cryptanalysis of forkaes
S Banik, J Bossert, A Jana, E List, S Lucks, W Meier, M Rahman, D Saha, ...
International Conference on Applied Cryptography and Network Security, 43-63, 2019
222019
XHX–a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing
A Jha, E List, K Minematsu, S Mishra, M Nandi
International Conference on Cryptology and Information Security in Latin …, 2017
212017
The system can't perform the operation now. Try again later.
Articles 1–20