Eik List

According to our database1, Eik List authored at least 44 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Diving Deep into the Preimage Security of AES-like Hashing.
IACR Cryptol. ePrint Arch., 2024

2023
On the Security of Triplex- and Multiplex-type Constructions with Smaller Tweaks.
IACR Cryptol. ePrint Arch., 2023

sfPAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation.
IACR Cryptol. ePrint Arch., 2023

PAE: Towards More Efficient and BBB-Secure AE from a Single Public Permutation.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

2022
Forking Sums of Permutations for Optimally Secure and Highly Efficient PRFs.
IACR Cryptol. ePrint Arch., 2022

CENCPP<sup>*</sup>: beyond-birthday-secure encryption from public permutations.
Des. Codes Cryptogr., 2022

Implicit Key-Stretching Security of Encryption Schemes.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

2021
Design, Analysis, and Implementation of Symmetric-key (Authenticated) Ciphers.
PhD thesis, 2021

The Oribatida v1.3 Family of Lightweight Authenticated Encryption Schemes.
J. Math. Cryptol., 2021

TEDT2 - Highly Secure Leakage-resilient TBC-based Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2021

2020
Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers.
IACR Trans. Symmetric Cryptol., 2020

Extended Truncated-differential Distinguishers on Round-reduced AES.
IACR Trans. Symmetric Cryptol., 2020

Pholkos - Efficient Large-state Tweakable Block Ciphers from the AES Round Function.
IACR Cryptol. ePrint Arch., 2020

CENCPP - Beyond-birthday-secure Encryption from Public Permutations.
IACR Cryptol. ePrint Arch., 2020

Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT).
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
DoveMAC: A TBC-based PRF with Smaller State, Full Security, and High Rate.
IACR Trans. Symmetric Cryptol., 2019

Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound.
IACR Cryptol. ePrint Arch., 2019

Extended Expectation Cryptanalysis on Round-reduced AES.
IACR Cryptol. ePrint Arch., 2019

Cryptanalysis of ForkAES.
IACR Cryptol. ePrint Arch., 2019

SecuriCast: zero-touch two-factor authentication using WebBluetooth.
Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2019

2018
Rasta: A cipher with low ANDdepth and few ANDs per bit.
IACR Cryptol. ePrint Arch., 2018

ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-block-cipher Calls.
IACR Cryptol. ePrint Arch., 2018

Differential Cryptanalysis of Round-Reduced Sparx-64/128.
IACR Cryptol. ePrint Arch., 2018

POEx: A beyond-birthday-bound-secure on-line cipher.
Cryptogr. Commun., 2018

2017
ZMAC+ - An Efficient Variable-output-length Variant of ZMAC.
IACR Trans. Symmetric Cryptol., 2017

Passphone: Outsourcing Phone-based Web Authentication while Protecting User Privacy.
IACR Cryptol. ePrint Arch., 2017

XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing.
IACR Cryptol. ePrint Arch., 2017

Reforgeability of Authenticated Encryption Schemes.
IACR Cryptol. ePrint Arch., 2017

Critical Graphs for Minimum Vertex Cover.
CoRR, 2017

2016
Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2016

Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch.
IACR Cryptol. ePrint Arch., 2016

Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC.
IACR Cryptol. ePrint Arch., 2016

Related-Key Impossible-Differential Attack on Reduced-Round SKINNY.
IACR Cryptol. ePrint Arch., 2016

RIV for Robust Authenticated Encryption.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

2014
Overview of the Candidates for the Password Hashing Competition - And their Resistance against Garbage-Collector Attacks.
IACR Cryptol. ePrint Arch., 2014

Pipelineable On-Line Encryption.
IACR Cryptol. ePrint Arch., 2014

Differential Cryptanalysis of Round-Reduced Simon and Speck.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Cryptanalysis of the Speck Family of Block Ciphers.
IACR Cryptol. ePrint Arch., 2013

Differential Cryptanalysis of Reduced-Round Simon.
IACR Cryptol. ePrint Arch., 2013

A Framework for Automated Independent-Biclique Cryptanalysis.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2012

Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers.
IACR Cryptol. ePrint Arch., 2012

2011
Mars Attacks! Revisited: - Differential Attack on 12 Rounds of the MARS Core and Defeating the Complex MARS Key-Schedule.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011


  Loading...