Christian Forler

Affiliations:
  • Hochschule Schmalkalden, Germany


According to our database1, Christian Forler authored at least 29 papers between 2009 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
POEx: A beyond-birthday-bound-secure on-line cipher.
Cryptogr. Commun., 2018

2017
Reforgeability of Authenticated Encryption Schemes.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
General classification of the authenticated encryption schemes for the CAESAR competition.
Comput. Sci. Rev., 2016

Passphone: Outsourcing Phone-Based Web Authentication While Protecting User Privacy.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

RIV for Robust Authenticated Encryption.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Analysis Design & Applications of Cryptographic Building Blocks.
PhD thesis, 2015

Analyse, Design und Einsatz kryptographischer Primitive.
Proceedings of the Ausgezeichnete Informatikdissertationen 2015, 2015

2014
COFFE: Ciphertext Output Feedback Faithful Encryption.
IACR Cryptol. ePrint Arch., 2014

Classification of the CAESAR Candidates.
IACR Cryptol. ePrint Arch., 2014

Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks.
Proceedings of the Technology and Practice of Passwords, 2014

Pipelineable On-line Encryption.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Memory-Demanding Password Scrambling.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Catena: A Memory-Consuming Password Scrambler.
IACR Cryptol. ePrint Arch., 2013

A Framework for Automated Independent-Biclique Cryptanalysis.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
The Collision Security of MDC-4 The Collision Security of MDC-4.
IACR Cryptol. ePrint Arch., 2012

Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers.
IACR Cryptol. ePrint Arch., 2012

McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

The Collision Security of MDC-4.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

Designing the API for a Cryptographic Library - A Misuse-Resistant Application Programming Interface.
Proceedings of the Reliable Software Technologies - Ada-Europe 2012, 2012

Weimar-DM: A Highly Secure Double-Length Compression Function.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
McOE: A Foolproof On-Line Authenticated Encryption Scheme.
IACR Cryptol. ePrint Arch., 2011

Γ-MAC[H, P] - A New Universal MAC Scheme.
Proceedings of the Research in Cryptology - 4th Western European Workshop, 2011

2010
TWISTER<sub>pi</sub> - a framework for secure and fast hash functions.
Int. J. Appl. Cryptogr., 2010

Collision Resistant Double-Length Hashing.
Proceedings of the Provable Security - 4th International Conference, 2010

New Boomerang Attacks on ARIA.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2009
Twister- A Framework for Secure and Fast Hash Functions.
Proceedings of the Information Security Practice and Experience, 2009

Classification of the SHA-3 Candidates.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009


  Loading...