Follow
Jakob Wenzel
Title
Cited by
Cited by
Year
Differential Cryptanalysis of Round-Reduced Simon and Speck
F Abed, E List, S Lucks, J Wenzel
Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015
1542015
McOE: A family of almost foolproof on-line authenticated encryption schemes
E Fleischmann, C Forler, S Lucks
Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012
1282012
Differential and linear cryptanalysis of reduced-round SIMON
F Abed, E List, S Lucks, J Wenzel
Cryptology ePrint Archive, 2013
742013
Differential and linear cryptanalysis of reduced-round SIMON
F Abed, E List, S Lucks, J Wenzel
Cryptology ePrint Archive, 2013
742013
Catena: A memory-consuming password-scrambling framework
C Forler, S Lucks, J Wenzel
Cryptology ePrint Archive, 2013
642013
Pipelineable on-line encryption
F Abed, S Fluhrer, C Forler, E List, S Lucks, D McGrew, J Wenzel
Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015
582015
Cryptanalysis of the speck family of block ciphers
F Abed, E List, S Lucks, J Wenzel
Cryptology ePrint Archive, 2013
382013
Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers.
F Abed, C Forler, E List, S Lucks, J Wenzel
IACR Cryptol. ePrint Arch. 2012, 591, 2012
292012
Memory-demanding password scrambling
C Forler, S Lucks, J Wenzel
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
262014
Weimar-DM: a highly secure double-length compression function
E Fleischmann, C Forler, S Lucks, J Wenzel
Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012
222012
The POET family of on-line authenticated encryption schemes
F Abed, S Fluhrer, J Foley, C Forler, E List, S Lucks, D McGrew, J Wenzel
CAESAR competition, 2015
212015
Overview of the Candidates for the Password Hashing Competition: And Their Resistance Against Garbage-Collector Attacks
C Forler, E List, S Lucks, J Wenzel
Technology and Practice of Passwords: International Conference on Passwords …, 2015
162015
A framework for automated independent-biclique cryptanalysis
F Abed, C Forler, E List, S Lucks, J Wenzel
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
162014
Reforgeability of authenticated encryption schemes
C Forler, E List, S Lucks, J Wenzel
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017
152017
RIV for robust authenticated encryption
F Abed, C Forler, E List, S Lucks, J Wenzel
Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum …, 2016
142016
Biclique cryptanalysis of PRESENT, LED, and KLEIN
F Abed, C Forler, E List, S Lucks, J Wenzel
Cryptology ePrint Archive, 2012
132012
Biclique cryptanalysis of PRESENT, LED, and KLEIN
F Abed, C Forler, E List, S Lucks, J Wenzel
Cryptology ePrint Archive, 2012
132012
Biclique cryptanalysis of present, led
F Abed, C Forler, E List, S Lucks, J Wenzel
and klein//Cryptology ePrint Archive: Report 2012/591–2012, 2012
122012
Designing the API for a cryptographic library: A misuse-resistant application programming interface
C Forler, S Lucks, J Wenzel
Reliable Software Technologies–Ada-Europe 2012: 17th Ada-Europe …, 2012
122012
Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch
C Forler, E List, S Lucks, J Wenzel
Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
112016
The system can't perform the operation now. Try again later.
Articles 1–20