Differential Cryptanalysis of Round-Reduced Simon and Speck F Abed, E List, S Lucks, J Wenzel Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015 | 173 | 2015 |
McOE: A family of almost foolproof on-line authenticated encryption schemes E Fleischmann, C Forler, S Lucks Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012 | 137 | 2012 |
Differential and linear cryptanalysis of reduced-round SIMON F Abed, E List, S Lucks, J Wenzel Cryptology ePrint Archive, 2013 | 75 | 2013 |
Catena: A memory-consuming password-scrambling framework C Forler, S Lucks, J Wenzel Cryptology ePrint Archive, 2013 | 73 | 2013 |
Pipelineable on-line encryption F Abed, S Fluhrer, C Forler, E List, S Lucks, D McGrew, J Wenzel International Workshop on Fast Software Encryption, 205-223, 2014 | 58 | 2014 |
Cryptanalysis of the speck family of block ciphers F Abed, E List, S Lucks, J Wenzel Cryptology ePrint Archive, 2013 | 40 | 2013 |
Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers. F Abed, C Forler, E List, S Lucks, J Wenzel IACR Cryptol. ePrint Arch. 2012, 591, 2012 | 34 | 2012 |
Memory-demanding password scrambling C Forler, S Lucks, J Wenzel Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 32 | 2014 |
Overview of the Candidates for the Password Hashing Competition: And Their Resistance Against Garbage-Collector Attacks C Forler, E List, S Lucks, J Wenzel Technology and Practice of Passwords: International Conference on Passwords …, 2015 | 23 | 2015 |
The POET family of on-line authenticated encryption schemes F Abed, S Fluhrer, J Foley, C Forler, E List, S Lucks, D McGrew, J Wenzel CAESAR submission, 2014 | 23 | 2014 |
Weimar-DM: a highly secure double-length compression function E Fleischmann, C Forler, S Lucks, J Wenzel Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012 | 23 | 2012 |
Biclique cryptanalysis of PRESENT, LED, and KLEIN F Abed, C Forler, E List, S Lucks, J Wenzel Cryptology ePrint Archive, 2012 | 22 | 2012 |
RIV for robust authenticated encryption F Abed, C Forler, E List, S Lucks, J Wenzel Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum …, 2016 | 20 | 2016 |
A framework for automated independent-biclique cryptanalysis F Abed, C Forler, E List, S Lucks, J Wenzel Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014 | 16 | 2014 |
Reforgeability of authenticated encryption schemes C Forler, E List, S Lucks, J Wenzel Australasian Conference on Information Security and Privacy, 19-37, 2017 | 15 | 2017 |
Designing the API for a cryptographic library: A misuse-resistant application programming interface C Forler, S Lucks, J Wenzel Reliable Software Technologies–Ada-Europe 2012: 17th Ada-Europe …, 2012 | 14 | 2012 |
Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch C Forler, E List, S Lucks, J Wenzel Australasian Conference on Information Security and Privacy, 317-332, 2016 | 13 | 2016 |
Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions F Abed, C Forler, E List, S Lucks, J Wenzel Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014 | 9 | 2014 |
McOE: A Foolproof On-Line Authenticated Encryption Scheme. E Fleischmann, C Forler, S Lucks, J Wenzel IACR Cryptol. ePrint Arch. 2011, 644, 2011 | 9 | 2011 |
The Catena Password-Scrambling Framework C Forler, S Lucks, J Wenzel Submission to Password Hashing Competition (PHC), 2015 | 7 | 2015 |