Eik List

Orcid: 0000-0003-0369-4901

According to our database1, Eik List authored at least 53 papers between 2011 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Forking sums of permutations for highly secure and efficient PRFs.
Des. Codes Cryptogr., October, 2025

HCTR+: An Optimally Secure TBC-Based Accordion Mode.
IACR Trans. Symmetric Cryptol., 2025

The Large Block Cipher Vistrutah.
IACR Trans. Symmetric Cryptol., 2025

Scrutinizing the Security of AES-based Hashing and One-way Functions.
IACR Cryptol. ePrint Arch., 2025

The Large Block Cipher Family Vistrutah.
IACR Cryptol. ePrint Arch., 2025

2024
Context-Committing Security of Leveled Leakage-Resilient AEAD.
IACR Trans. Symmetric Cryptol., 2024

FEDT: Forkcipher-based Leakage-resilient Beyond-birthday-secure AE.
IACR Commun. Cryptol., 2024

Higher-Order Mixture Differentials for AES-Based Block Ciphers and Applications to TweAES.
Proceedings of the Advances in Information and Computer Security, 2024

Proving the Security of the Extended Summation-Truncation Hybrid.
Proceedings of the Progress in Cryptology - INDOCRYPT 2024, 2024

Diving Deep into the Preimage Security of AES-Like Hashing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

2023
sfPAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation.
IACR Cryptol. ePrint Arch., 2023

On the Security of Triplex- and Multiplex-Type Constructions with Smaller Tweaks.
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023

PAE: Towards More Efficient and BBB-Secure AE from a Single Public Permutation.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

2022
Forking Sums of Permutations for Optimally Secure and Highly Efficient PRFs.
IACR Cryptol. ePrint Arch., 2022

CENCPP<sup>*</sup>: beyond-birthday-secure encryption from public permutations.
Des. Codes Cryptogr., 2022

Implicit Key-Stretching Security of Encryption Schemes.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

Pholkos - Efficient Large-State Tweakable Block Ciphers from the AES Round Function.
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022

2021
Design, Analysis, and Implementation of Symmetric-key (Authenticated) Ciphers.
PhD thesis, 2021

The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes.
J. Math. Cryptol., 2021

TEDT2 - Highly Secure Leakage-Resilient TBC-Based Authenticated Encryption.
Proceedings of the Progress in Cryptology - LATINCRYPT 2021, 2021

2020
Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers.
IACR Trans. Symmetric Cryptol., 2020

Extended Truncated-differential Distinguishers on Round-reduced AES.
IACR Trans. Symmetric Cryptol., 2020

CENCPP - Beyond-birthday-secure Encryption from Public Permutations.
IACR Cryptol. ePrint Arch., 2020

Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT).
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
DoveMAC: A TBC-based PRF with Smaller State, Full Security, and High Rate.
IACR Trans. Symmetric Cryptol., 2019

Extended Expectation Cryptanalysis on Round-reduced AES.
IACR Cryptol. ePrint Arch., 2019

SecuriCast: zero-touch two-factor authentication using WebBluetooth.
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2019

Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound.
Proceedings of the Applied Cryptography and Network Security, 2019

Cryptanalysis of ForkAES.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
POEx: A beyond-birthday-bound-secure on-line cipher.
Cryptogr. Commun., 2018

Rasta: A Cipher with Low ANDdepth and Few ANDs per Bit.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-Block-Cipher Calls.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

Differential Cryptanalysis of Round-Reduced Sparx-64/128.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
ZMAC+ - An Efficient Variable-output-length Variant of ZMAC.
IACR Trans. Symmetric Cryptol., 2017

Critical Graphs for Minimum Vertex Cover.
CoRR, 2017

XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing.
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017

Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

Related-Key Impossible-Differential Attack on Reduced-Round Skinny.
Proceedings of the Applied Cryptography and Network Security, 2017

Reforgeability of Authenticated Encryption Schemes.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Passphone: Outsourcing Phone-Based Web Authentication While Protecting User Privacy.
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016

RIV for Robust Authenticated Encryption.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2014
Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks.
Proceedings of the Technology and Practice of Passwords, 2014

Differential Cryptanalysis of Round-Reduced Simon and Speck.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Pipelineable On-line Encryption.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Cryptanalysis of the Speck Family of Block Ciphers.
IACR Cryptol. ePrint Arch., 2013

Differential Cryptanalysis of Reduced-Round Simon.
IACR Cryptol. ePrint Arch., 2013

A Framework for Automated Independent-Biclique Cryptanalysis.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2012

Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers.
IACR Cryptol. ePrint Arch., 2012

2011
Mars Attacks! Revisited: - Differential Attack on 12 Rounds of the MARS Core and Defeating the Complex MARS Key-Schedule.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011


  Loading...