[go: up one dir, main page]

Follow
Tyge Tiessen
Tyge Tiessen
Verified email at dtu.dk
Title
Cited by
Cited by
Year
Ciphers for MPC and FHE
MR Albrecht, C Rechberger, T Schneider, T Tiessen, M Zohner
Annual International Conference on the Theory and Applications of …, 2015
5842015
MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity
M Albrecht, L Grassi, C Rechberger, A Roy, T Tiessen
International Conference on the Theory and Application of Cryptology and …, 2016
5042016
Observations on the SIMON block cipher family
S Kölbl, G Leander, T Tiessen
Annual Cryptology Conference, 161-185, 2015
2402015
Security of the AES with a Secret S-Box
T Tiessen, LR Knudsen, S Kölbl, MM Lauridsen
International Workshop on Fast Software Encryption, 175-189, 2015
722015
Continuous percolation with discontinuities
J Nagler, T Tiessen, HW Gutch
Physical Review X 2 (3), 031009, 2012
702012
Finding integral distinguishers with ease
Z Eskandari, AB Kidmose, S Kölbl, T Tiessen
International Conference on Selected Areas in Cryptography, 115-138, 2018
632018
Cryptanalysis of low-data instances of full LowMCv2
C Rechberger, H Soleimany, T Tiessen
IACR Transactions on Symmetric Cryptology 2018 (3), 163-181, 2018
622018
Polytopic cryptanalysis
T Tiessen
Annual International Conference on the Theory and Applications of …, 2016
572016
A Formal Analysis of Boomerang Probabilities
AB Kidmose, T Tiessen
IACR Transactions on Symmetric Cryptology 2022 (1), 88-109, 2022
112022
From higher-order differentials to polytopic cryptyanalysis
T Tiessen
International Conference on Cryptology in Malaysia, 544-552, 2016
62016
Cryptanalysis of full SCARF
A Flórez-Gutiérrez, E Lambooij, G Leurent, H Raddum, T Tiessen, ...
Annual International Conference on the Theory and Applications of …, 2025
42025
Secure Block Ciphers-Cryptanalysis and Design
T Tiessen
Technical University of Denmark, 2017
32017
Is this your USB? No, but check this QR code for a free meal! Assessing awareness against dropped USBs and malicious QR codes
J Nordskov, T Tiessen, E Vasilomanolakis
7th Workshop on Attackers and Cyber-Crime Operations, 2025
2025
The system can't perform the operation now. Try again later.
Articles 1–13