Ewan Fleischmann

According to our database1, Ewan Fleischmann authored at least 25 papers between 2008 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Analysis and Design of Blockcipher Based Cryptographic Algorithms.
PhD thesis, 2013

2012
The Collision Security of MDC-4 The Collision Security of MDC-4.
IACR Cryptol. ePrint Arch., 2012

McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

The Collision Security of MDC-4.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

Weimar-DM: A Highly Secure Double-Length Compression Function.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
McOE: A Foolproof On-Line Authenticated Encryption Scheme.
IACR Cryptol. ePrint Arch., 2011

Γ-MAC[H, P] - A New Universal MAC Scheme.
Proceedings of the Research in Cryptology - 4th Western European Workshop, 2011

The Preimage Security of Double-Block-Length Compression Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
TWISTER<sub>pi</sub> - a framework for secure and fast hash functions.
Int. J. Appl. Cryptogr., 2010

Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited.
IACR Cryptol. ePrint Arch., 2010

Some Observations on Indifferentiability.
IACR Cryptol. ePrint Arch., 2010

Collision Resistant Double-Length Hashing.
Proceedings of the Provable Security - 4th International Conference, 2010

New Boomerang Attacks on ARIA.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2009
Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode.
IACR Cryptol. ePrint Arch., 2009

Attacking Reduced Rounds of the ARIA Block Cipher.
IACR Cryptol. ePrint Arch., 2009

Security of Cyclic Double Block Length Hash Functions including Abreast-DM.
IACR Cryptol. ePrint Arch., 2009

On the Security of Tandem-DM.
IACR Cryptol. ePrint Arch., 2009

Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2.
Proceedings of the Information Security Practice and Experience, 2009

Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher.
Proceedings of the Information Security Practice and Experience, 2009

Twister- A Framework for Secure and Fast Hash Functions.
Proceedings of the Information Security Practice and Experience, 2009

Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode.
Proceedings of the Progress in Cryptology, 2009

Security of Cyclic Double Block Length Hash Functions.
Proceedings of the Cryptography and Coding, 2009

Attacking 9 and 10 Rounds of AES-256.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Some Observations on SHAMATA.
IACR Cryptol. ePrint Arch., 2008

Classification of the SHA-3 Candidates.
IACR Cryptol. ePrint Arch., 2008


  Loading...