Christian Forler

Affiliations:
  • Hochschule Schmalkalden, Germany


According to our database1, Christian Forler authored at least 29 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
POEx: A beyond-birthday-bound-secure on-line cipher.
Cryptogr. Commun., 2018

2017
Passphone: Outsourcing Phone-based Web Authentication while Protecting User Privacy.
IACR Cryptol. ePrint Arch., 2017

Reforgeability of Authenticated Encryption Schemes.
IACR Cryptol. ePrint Arch., 2017

2016
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch.
IACR Cryptol. ePrint Arch., 2016

General classification of the authenticated encryption schemes for the CAESAR competition.
Comput. Sci. Rev., 2016

RIV for Robust Authenticated Encryption.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

2015
Analysis Design & Applications of Cryptographic Building Blocks.
PhD thesis, 2015

Analyse, Design und Einsatz kryptographischer Primitive.
Proceedings of the Ausgezeichnete Informatikdissertationen 2015, 2015

2014
COFFE: Ciphertext Output Feedback Faithful Encryption.
IACR Cryptol. ePrint Arch., 2014

Overview of the Candidates for the Password Hashing Competition - And their Resistance against Garbage-Collector Attacks.
IACR Cryptol. ePrint Arch., 2014

Classification of the CAESAR Candidates.
IACR Cryptol. ePrint Arch., 2014

Pipelineable On-Line Encryption.
IACR Cryptol. ePrint Arch., 2014

Memory-Demanding Password Scrambling.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Catena: A Memory-Consuming Password Scrambler.
IACR Cryptol. ePrint Arch., 2013

A Framework for Automated Independent-Biclique Cryptanalysis.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
The Collision Security of MDC-4 The Collision Security of MDC-4.
IACR Cryptol. ePrint Arch., 2012

Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers.
IACR Cryptol. ePrint Arch., 2012

McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

The Collision Security of MDC-4.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

Designing the API for a Cryptographic Library - A Misuse-Resistant Application Programming Interface.
Proceedings of the Reliable Software Technologies - Ada-Europe 2012, 2012

Weimar-DM: A Highly Secure Double-Length Compression Function.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
McOE: A Foolproof On-Line Authenticated Encryption Scheme.
IACR Cryptol. ePrint Arch., 2011

Γ-MAC[H, P] - A New Universal MAC Scheme.
Proceedings of the Research in Cryptology - 4th Western European Workshop, 2011

2010
TWISTER<sub>pi</sub> - a framework for secure and fast hash functions.
Int. J. Appl. Cryptogr., 2010

Collision Resistant Double-Length Hashing.
Proceedings of the Provable Security - 4th International Conference, 2010

New Boomerang Attacks on ARIA.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2009
Twister- A Framework for Secure and Fast Hash Functions.
Proceedings of the Information Security Practice and Experience, 2009

2008
Classification of the SHA-3 Candidates.
IACR Cryptol. ePrint Arch., 2008


  Loading...