[go: up one dir, main page]

Follow
John Steinberger
John Steinberger
Verified email at tsinghua.edu.cn - Homepage
Title
Cited by
Cited by
Year
Tight security bounds for key-alternating ciphers
S Chen, J Steinberger
Annual International Conference on the Theory and Applications of …, 2014
3612014
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations
A Bogdanov, LR Knudsen, G Leander, FX Standaert, J Steinberger, ...
Annual international conference on the theory and applications of …, 2012
1582012
Minimizing the two-round Even-Mansour cipher
S Chen, R Lampe, J Lee, Y Seurin, J Steinberger
Annual Cryptology Conference, 39-56, 2014
1152014
Constructing cryptographic hash functions from fixed-key blockciphers
P Rogaway, J Steinberger
Annual International Cryptology Conference, 433-450, 2008
1112008
Random oracles and non-uniformity
S Coretti, Y Dodis, S Guo, J Steinberger
Annual International Conference on the Theory and Applications of …, 2018
1032018
On the indifferentiability of key-alternating ciphers
E Andreeva, A Bogdanov, Y Dodis, B Mennink, JP Steinberger
Annual Cryptology Conference, 531-550, 2013
1032013
Security/efficiency tradeoffs for permutation-based hashing
P Rogaway, J Steinberger
Annual International Conference on the Theory and Applications of …, 2008
932008
The collision intractability of MDC-2 in the ideal-cipher model
JP Steinberger
Annual International Conference on the Theory and Applications of …, 2007
832007
To Hash or Not to Hash Again?(In) Differentiability Results for and HMAC
Y Dodis, T Ristenpart, J Steinberger, S Tessaro
Annual Cryptology Conference, 348-366, 2012
792012
Indifferentiability of 8-round Feistel networks
Y Dai, J Steinberger
Annual International Cryptology Conference, 95-120, 2016
702016
Indifferentiability of confusion-diffusion networks
Y Dodis, M Stam, J Steinberger, T Liu
Annual International Conference on the Theory and Applications of …, 2016
662016
Improved security bounds for key-alternating ciphers via hellinger distance
J Steinberger
Cryptology ePrint Archive, 2012
622012
The preimage security of double-block-length compression functions
F Armknecht, E Fleischmann, M Krause, J Lee, M Stam, J Steinberger
International Conference on the Theory and Application of Cryptology and …, 2011
612011
The collision security of Tandem-DM in the ideal cipher model
J Lee, M Stam, J Steinberger
Annual Cryptology Conference, 561-577, 2011
552011
Message authentication codes from unpredictable block ciphers
Y Dodis, J Steinberger
Annual International Cryptology Conference, 267-285, 2009
502009
Provable security of (tweakable) block ciphers based on substitution-permutation networks
B Cogliati, Y Dodis, J Katz, J Lee, J Steinberger, A Thiruvengadam, ...
Annual International Cryptology Conference, 722-753, 2018
432018
Minimal vanishing sums of roots of unity with large coefficients
JP Steinberger
Proceedings of the London Mathematical Society 97 (3), 689-717, 2008
432008
Domain extension for MACs beyond the birthday barrier
Y Dodis, J Steinberger
Annual International Conference on the Theory and Applications of …, 2011
402011
Minimizing the two-round even–mansour cipher
S Chen, R Lampe, J Lee, Y Seurin, J Steinberger
Journal of Cryptology 31 (4), 1064-1119, 2018
342018
Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: five rounds are necessary and sufficient
Y Dai, Y Seurin, J Steinberger, A Thiruvengadam
Annual International Cryptology Conference, 524-555, 2017
332017
The system can't perform the operation now. Try again later.
Articles 1–20