Kölbl, Stefan; Tischhauser, Elmar; Derbez, Patrick; Bogdanov, Andrey Troika: a ternary cryptographic hash function. (English) Zbl 1469.94104 Des. Codes Cryptography 88, No. 1, 91-117 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Kölbl} et al., Des. Codes Cryptography 88, No. 1, 91--117 (2020; Zbl 1469.94104) Full Text: DOI
Luykx, Atul; Preneel, Bart; Tischhauser, Elmar; Yasuda, Kan A MAC mode for lightweight block ciphers. (English) Zbl 1387.94092 Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 43-59 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Luykx} et al., Lect. Notes Comput. Sci. 9783, 43--59 (2016; Zbl 1387.94092) Full Text: DOI Link
Bogdanov, Andrey; Isobe, Takanori; Tischhauser, Elmar Towards practical whitebox cryptography: optimizing efficiency and space hardness. (English) Zbl 1404.94041 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 126-158 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Bogdanov} et al., Lect. Notes Comput. Sci. 10031, 126--158 (2016; Zbl 1404.94041) Full Text: DOI
Bogdanov, Andrey; Kizhvatov, Ilya; Manzoor, Kamran; Tischhauser, Elmar; Witteman, Marc Fast and memory-efficient key recovery in side-channel attacks. (English) Zbl 1396.94062 Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 310-327 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Bogdanov} et al., Lect. Notes Comput. Sci. 9566, 310--327 (2016; Zbl 1396.94062) Full Text: DOI
Abdelraheem, Mohamed Ahmed; Beelen, Peter; Bogdanov, Andrey; Tischhauser, Elmar Twisted polynomials and forgery attacks on GCM. (English) Zbl 1370.94475 Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 762-786 (2015). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. A. Abdelraheem} et al., Lect. Notes Comput. Sci. 9056, 762--786 (2015; Zbl 1370.94475) Full Text: DOI
Bogdanov, Andrey; Lauridsen, Martin M.; Tischhauser, Elmar Comb to pipeline: fast software encryption revisited. (English) Zbl 1367.94303 Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 150-171 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Bogdanov} et al., Lect. Notes Comput. Sci. 9054, 150--171 (2015; Zbl 1367.94303) Full Text: DOI
Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria; Lauridsen, Martin M.; Mendel, Florian; Schläffer, Martin; Tischhauser, Elmar Key recovery attacks on recent authenticated ciphers. (English) Zbl 1370.94490 Aranha, F. (ed.) et al., Progress in cryptology – LATINCRYPT 2014. Third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17–19, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16294-2/pbk; 978-3-319-16295-9/ebook). Lecture Notes in Computer Science 8895, 274-287 (2015). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{A. Bogdanov} et al., Lect. Notes Comput. Sci. 8895, 274--287 (2015; Zbl 1370.94490) Full Text: DOI
Bogdanov, Andrey; Mendel, Florian; Regazzoni, Francesco; Rijmen, Vincent; Tischhauser, Elmar ALE: AES-based lightweight authenticated encryption. (English) Zbl 1321.94042 Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 447-466 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Bogdanov} et al., Lect. Notes Comput. Sci. 8424, 447--466 (2014; Zbl 1321.94042) Full Text: DOI
Bogdanov, Andrey; Tischhauser, Elmar On the wrong key randomisation and key equivalence hypotheses in Matsui’s algorithm 2. (English) Zbl 1321.94043 Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 19-38 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Bogdanov} and \textit{E. Tischhauser}, Lect. Notes Comput. Sci. 8424, 19--38 (2014; Zbl 1321.94043) Full Text: DOI
Bogdanov, Andrey; Kavun, Elif Bilge; Tischhauser, Elmar; Yalçın, Tolga Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis. (English) Zbl 1338.94067 J. Comput. Appl. Math. 259, Part B, 592-598 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Bogdanov} et al., J. Comput. Appl. Math. 259, Part B, 592--598 (2014; Zbl 1338.94067) Full Text: DOI
Ideguchi, Kota; Tischhauser, Elmar; Preneel, Bart Internal differential collision attacks on the reduced-round Grøstl-0 hash function. (English) Zbl 1291.94101 Des. Codes Cryptography 70, No. 3, 251-271 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Ideguchi} et al., Des. Codes Cryptography 70, No. 3, 251--271 (2014; Zbl 1291.94101) Full Text: DOI
Andreeva, Elena; Bogdanov, Andrey; Luykx, Atul; Mennink, Bart; Tischhauser, Elmar; Yasuda, Kan Parallelizable and authenticated online ciphers. (English) Zbl 1327.94026 Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 424-443 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Andreeva} et al., Lect. Notes Comput. Sci. 8269, 424--443 (2013; Zbl 1327.94026) Full Text: DOI
Wang, Meiqin; Sun, Yue; Tischhauser, Elmar; Preneel, Bart A model for structure attacks, with applications to PRESENT and Serpent. (English) Zbl 1312.94098 Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 49-68 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Wang} et al., Lect. Notes Comput. Sci. 7549, 49--68 (2012; Zbl 1312.94098) Full Text: DOI Link
Bogdanov, Andrey; Knudsen, Lars R.; Leander, Gregor; Standaert, Francois-Xavier; Steinberger, John; Tischhauser, Elmar Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract). (English) Zbl 1290.94044 Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 45-62 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Bogdanov} et al., Lect. Notes Comput. Sci. 7237, 45--62 (2012; Zbl 1290.94044) Full Text: DOI
Ideguchi, Kota; Tischhauser, Elmar; Preneel, Bart Improved collision attacks on the reduced-round Grøstl hash function. (English) Zbl 1371.94642 Burmester, Mike (ed.) et al., Information security. 13th international conference, ISC 2010, Boca Raton, FL, USA, October 25–28, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-18177-1/pbk). Lecture Notes in Computer Science 6531, 1-16 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Ideguchi} et al., Lect. Notes Comput. Sci. 6531, 1--16 (2011; Zbl 1371.94642) Full Text: DOI Link
Tischhauser, Elmar Nonsmooth cryptanalysis, with an application to the stream cipher MICKEY. (English) Zbl 1211.94040 J. Math. Cryptol. 4, No. 4, 317-348 (2010). MSC: 94A60 90C09 90C56 90C90 PDFBibTeX XMLCite \textit{E. Tischhauser}, J. Math. Cryptol. 4, No. 4, 317--348 (2010; Zbl 1211.94040) Full Text: DOI
Barreto, Paulo; Nikov, Ventzislav; Nikova, Svetla; Rijmen, Vincent; Tischhauser, Elmar Whirlwind: a new cryptographic hash function. (English) Zbl 1256.94042 Des. Codes Cryptography 56, No. 2-3, 141-162 (2010). MSC: 94A60 11T71 12E30 PDFBibTeX XMLCite \textit{P. Barreto} et al., Des. Codes Cryptography 56, No. 2--3, 141--162 (2010; Zbl 1256.94042) Full Text: DOI