Damian Vizár

According to our database1, Damian Vizár authored at least 18 papers between 2014 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Power Yoga: Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT.
IACR Trans. Symmetric Cryptol., 2021

1, 2, 3, Fork: Counter Mode Variants based on a Generalized Forkcipher.
IACR Trans. Symmetric Cryptol., 2021

RUP Security of the SAEF Authenticated Encryption mode.
IACR Cryptol. ePrint Arch., 2021

2020
Nonce-Misuse Security of the SAEF Authenticated Encryption mode.
IACR Cryptol. ePrint Arch., 2020

2019
Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages.
IACR Cryptol. ePrint Arch., 2019

2018
Forking a Blockcipher for Authenticated Encryption of Very Short Messages.
IACR Cryptol. ePrint Arch., 2018

Can Caesar Beat Galois? - Robustness of CAESAR Candidates Against Nonce Reusing and High Data Complexity Attacks.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Under Pressure: Security of Caesar Candidates beyond their Guarantees.
IACR Cryptol. ePrint Arch., 2017

Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models.
IACR Cryptol. ePrint Arch., 2017

2016
Ciphertext Forgery on HANUMAN.
IACR Cryptol. ePrint Arch., 2016

Authenticated Encryption with Variable Stretch.
IACR Cryptol. ePrint Arch., 2016

CENC is Optimally Secure.
IACR Cryptol. ePrint Arch., 2016

2015
Boosting OMD for Almost Free Authentication of Associated Data.
IACR Cryptol. ePrint Arch., 2015

Security of Full-State Keyed and Duplex Sponge: Applications to Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2015

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance.
IACR Cryptol. ePrint Arch., 2015

Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
OMD: A Compression Function Mode of Operation for Authenticated Encryption.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Misuse-Resistant Variants of the OMD Authenticated Encryption Mode.
Proceedings of the Provable Security - 8th International Conference, 2014


  Loading...