When intrusion detection meets blockchain technology: a review W Meng, EW Tischhauser, Q Wang, Y Wang, J Han Ieee Access 6, 10179-10188, 2018 | 573 | 2018 |
ALE: AES-based lightweight authenticated encryption A Bogdanov, F Mendel, F Regazzoni, V Rijmen, E Tischhauser Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014 | 159 | 2014 |
Parallelizable and authenticated online ciphers E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 143 | 2013 |
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations A Bogdanov, LR Knudsen, G Leander, FX Standaert, J Steinberger, ... Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012 | 142 | 2012 |
A MAC mode for lightweight block ciphers A Luykx, B Preneel, E Tischhauser, K Yasuda Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum …, 2016 | 103 | 2016 |
Towards practical whitebox cryptography: optimizing efficiency and space hardness A Bogdanov, T Isobe, E Tischhauser International Conference on the Theory and Application of Cryptology and …, 2016 | 77 | 2016 |
Fast and memory-efficient key recovery in side-channel attacks A Bogdanov, I Kizhvatov, K Manzoor, E Tischhauser, M Witteman Selected Areas in Cryptography–SAC 2015: 22nd International Conference …, 2016 | 60 | 2016 |
On the wrong key randomisation and key equivalence hypotheses in Matsui’s Algorithm 2 A Bogdanov, E Tischhauser Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014 | 60 | 2014 |
Whirlwind: a new cryptographic hash function P Barreto, V Nikov, S Nikova, V Rijmen, E Tischhauser Designs, codes and cryptography 56, 141-162, 2010 | 50 | 2010 |
SUNDAE: small universal deterministic authenticated encryption for the internet of things S Banik, A Bogdanov, A Luykx, E Tischhauser IACR Transactions on Symmetric Cryptology 2018 (3), 1-35, 2018 | 43 | 2018 |
COLM v1 E Andreeva, A Bogdanov, N Datta, A Luykx, B Mennink, M Nandi, ... Submission to the CAESAR Competition, 2016 | 43 | 2016 |
The LANE hash function S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ... Dagstuhl Seminar Proceedings, 2009 | 40 | 2009 |
A model for structure attacks, with applications to PRESENT and Serpent M Wang, Y Sun, E Tischhauser, B Preneel Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012 | 35 | 2012 |
Sundae-gift S Banik, A Bogdanov, T Peyrin, Y Sasaki, SM Sim, E Tischhauser, Y Todo Submission to Round 1, 157-161, 2019 | 27 | 2019 |
Twisted polynomials and forgery attacks on GCM MA Abdelraheem, P Beelen, A Bogdanov, E Tischhauser Advances in Cryptology--EUROCRYPT 2015: 34th Annual International Conference …, 2015 | 26 | 2015 |
AES-COPA v. E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda | 25 | 2015 |
AES-based authenticated encryption modes in parallel high-performance software A Bogdanov, MM Lauridsen, E Tischhauser Cryptology ePrint Archive, 2014 | 25 | 2014 |
Improved collision attacks on the reduced-round Grøstl hash function K Ideguchi, E Tischhauser, B Preneel Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011 | 23 | 2011 |
Comb to pipeline: Fast software encryption revisited A Bogdanov, MM Lauridsen, E Tischhauser Fast Software Encryption: 22nd International Workshop, FSE 2015, Istanbul …, 2015 | 21 | 2015 |
Multivariate profiling of hulls for linear cryptanalysis A Bogdanov, EW Tischhauser, PS Vejre IACR Transactions on Symmetric Cryptology 2018 (1), 101-125, 2018 | 18 | 2018 |