Eik List
Orcid: 0000-0003-0369-4901
According to our database1,
Eik List
authored at least 53 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Des. Codes Cryptogr., October, 2025
IACR Trans. Symmetric Cryptol., 2025
IACR Cryptol. ePrint Arch., 2025
2024
IACR Trans. Symmetric Cryptol., 2024
IACR Commun. Cryptol., 2024
Higher-Order Mixture Differentials for AES-Based Block Ciphers and Applications to TweAES.
Proceedings of the Advances in Information and Computer Security, 2024
Proceedings of the Progress in Cryptology - INDOCRYPT 2024, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Des. Codes Cryptogr., 2022
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022
2021
PhD thesis, 2021
J. Math. Cryptol., 2021
Proceedings of the Progress in Cryptology - LATINCRYPT 2021, 2021
2020
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Symmetric Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
IACR Trans. Symmetric Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2019
Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound.
Proceedings of the Applied Cryptography and Network Security, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-Block-Cipher Calls.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
Proceedings of the Applied Cryptography and Network Security, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing.
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017
Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Proceedings of the Secure IT Systems - 21st Nordic Conference, NordSec 2016, Oulu, Finland, 2016
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2014
Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks.
Proceedings of the Technology and Practice of Passwords, 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
2012
On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
2011
Mars Attacks! Revisited: - Differential Attack on 12 Rounds of the MARS Core and Defeating the Complex MARS Key-Schedule.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011