Differential Cryptanalysis of Round-Reduced Simon and Speck F Abed, E List, S Lucks, J Wenzel Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015 | 154 | 2015 |
McOE: A family of almost foolproof on-line authenticated encryption schemes E Fleischmann, C Forler, S Lucks Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012 | 128 | 2012 |
Differential and linear cryptanalysis of reduced-round SIMON F Abed, E List, S Lucks, J Wenzel Cryptology ePrint Archive, 2013 | 74 | 2013 |
Differential and linear cryptanalysis of reduced-round SIMON F Abed, E List, S Lucks, J Wenzel Cryptology ePrint Archive, 2013 | 74 | 2013 |
Catena: A memory-consuming password-scrambling framework C Forler, S Lucks, J Wenzel Cryptology ePrint Archive, 2013 | 64 | 2013 |
Pipelineable on-line encryption F Abed, S Fluhrer, C Forler, E List, S Lucks, D McGrew, J Wenzel Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015 | 58 | 2015 |
Cryptanalysis of the speck family of block ciphers F Abed, E List, S Lucks, J Wenzel Cryptology ePrint Archive, 2013 | 38 | 2013 |
Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers. F Abed, C Forler, E List, S Lucks, J Wenzel IACR Cryptol. ePrint Arch. 2012, 591, 2012 | 29 | 2012 |
Memory-demanding password scrambling C Forler, S Lucks, J Wenzel Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 26 | 2014 |
Weimar-DM: a highly secure double-length compression function E Fleischmann, C Forler, S Lucks, J Wenzel Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012 | 22 | 2012 |
The POET family of on-line authenticated encryption schemes F Abed, S Fluhrer, J Foley, C Forler, E List, S Lucks, D McGrew, J Wenzel CAESAR competition, 2015 | 21 | 2015 |
Overview of the Candidates for the Password Hashing Competition: And Their Resistance Against Garbage-Collector Attacks C Forler, E List, S Lucks, J Wenzel Technology and Practice of Passwords: International Conference on Passwords …, 2015 | 16 | 2015 |
A framework for automated independent-biclique cryptanalysis F Abed, C Forler, E List, S Lucks, J Wenzel Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014 | 16 | 2014 |
Reforgeability of authenticated encryption schemes C Forler, E List, S Lucks, J Wenzel Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017 | 15 | 2017 |
RIV for robust authenticated encryption F Abed, C Forler, E List, S Lucks, J Wenzel Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum …, 2016 | 14 | 2016 |
Biclique cryptanalysis of PRESENT, LED, and KLEIN F Abed, C Forler, E List, S Lucks, J Wenzel Cryptology ePrint Archive, 2012 | 13 | 2012 |
Biclique cryptanalysis of PRESENT, LED, and KLEIN F Abed, C Forler, E List, S Lucks, J Wenzel Cryptology ePrint Archive, 2012 | 13 | 2012 |
Biclique cryptanalysis of present, led F Abed, C Forler, E List, S Lucks, J Wenzel and klein//Cryptology ePrint Archive: Report 2012/591–2012, 2012 | 12 | 2012 |
Designing the API for a cryptographic library: A misuse-resistant application programming interface C Forler, S Lucks, J Wenzel Reliable Software Technologies–Ada-Europe 2012: 17th Ada-Europe …, 2012 | 12 | 2012 |
Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch C Forler, E List, S Lucks, J Wenzel Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 11 | 2016 |