Ivica Nikolic

Orcid: 0000-0001-9578-4837

According to our database1, Ivica Nikolic authored at least 56 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
User-Customizable Transpilation of Scripting Languages.
Proc. ACM Program. Lang., April, 2023

User-customizable Transpilation of Scripting Languages.
CoRR, 2023

Unforgeability in Stochastic Gradient Descent.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2021
The Deoxys AEAD Family.
J. Cryptol., 2021

Refined Grey-Box Fuzzing with Sivo.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

2020
OHIE: Blockchain Scaling Made Simple.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
Combining PUF with RLUTs: A Two-party Pay-per-device IP Licensing Scheme on FPGAs.
ACM Trans. Embed. Comput. Syst., 2019

Exploiting the laws of order in smart contracts.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

2018
Finding The Greedy, Prodigal, and Suicidal Contracts at Scale.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
How to Use Metaheuristics for Design of Symmetric-Key Primitives.
IACR Cryptol. ePrint Arch., 2017

Opening pandora's box: Implication of RLUT on secure FPGA applications and IP security.
Proceedings of the IEEE 2nd International Verification and Security Workshop, 2017

2016
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Trans. Symmetric Cryptol., 2016

Practical Forgeries and Distinguishers against PAES.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

A New Algorithm for the Unbalanced Meet-in-the-Middle Problem.
IACR Cryptol. ePrint Arch., 2016

Refinements of the k-tree Algorithm for the Generalized Birthday Problem.
IACR Cryptol. ePrint Arch., 2016

Efficient Design Strategies Based on the AES Round Function.
IACR Cryptol. ePrint Arch., 2016

Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions.
IACR Cryptol. ePrint Arch., 2016

SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition.
IACR Cryptol. ePrint Arch., 2016

Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Cryptol. ePrint Arch., 2016

Extended meet-in-the-middle attacks on some Feistel constructions.
Des. Codes Cryptogr., 2016

2015
Cryptanalysis of Round-Reduced LED.
IACR Cryptol. ePrint Arch., 2015

Rotational Cryptanalysis of ARX Revisited.
IACR Cryptol. ePrint Arch., 2015

Security Analysis of PRINCE.
IACR Cryptol. ePrint Arch., 2015

Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation.
IACR Cryptol. ePrint Arch., 2015

Complementing Feistel Ciphers.
IACR Cryptol. ePrint Arch., 2015

Invariant Subspace Attack Against Full Midori64.
IACR Cryptol. ePrint Arch., 2015

More Rounds, Less Security?
IACR Cryptol. ePrint Arch., 2015

The parallel-cut meet-in-the-middle attack.
Cryptogr. Commun., 2015

Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- f f Permutation.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

2014
Rotational Rebound Attacks on Reduced Skein.
J. Cryptol., 2014

Tweaks and Keys for Block Ciphers: the TWEAKEY Framework.
IACR Cryptol. ePrint Arch., 2014

Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128.
IACR Cryptol. ePrint Arch., 2014

The resistance of PRESENT-80 against related-key differential attacks.
Cryptogr. Commun., 2014

Practical Cryptanalysis of PAES.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Colliding Keys for SC2000-256.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Meet-in-the-Middle Attacks on Generic Feistel Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Cryptanalysis of Zorro.
IACR Cryptol. ePrint Arch., 2013

Analysis of BLAKE2.
IACR Cryptol. ePrint Arch., 2013

Cryptanalysis of Round-Reduced \mathttLED.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2011
Boomerang Attacks on BLAKE-32.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

Search for Related-Key Differential Characteristics in DES-Like Ciphers.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

Second-Order Differential Collisions for Reduced SHA-256.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Automatic Search for Related-Key Diff erential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others.
IACR Cryptol. ePrint Arch., 2010

Tweaking AES.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Known and Chosen Key Differential Distinguishers for Block Ciphers.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

Rotational Cryptanalysis of ARX.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

2009
Rebound Attack on the Full LANE Compression Function.
IACR Cryptol. ePrint Arch., 2009

Examples of differential multicollisions for 13 and 14 rounds of AES-256.
IACR Cryptol. ePrint Arch., 2009

Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version).
IACR Cryptol. ePrint Arch., 2009

Meet-in-the-Middle Attacks on SHA-3 Candidates.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Cryptanalysis of the LAKE Hash Family.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Speeding up Collision Search for Byte-Oriented Hash Functions.
Proceedings of the Topics in Cryptology, 2009

Distinguisher and Related-Key Attack on the Full AES-256.
Proceedings of the Advances in Cryptology, 2009

2008
Cryptanalysis of EnRUPT.
IACR Cryptol. ePrint Arch., 2008

Collisions for Step-Reduced SHA-256.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008


  Loading...