Marc Stevens

Orcid: 0000-0002-7091-2924

Affiliations:
  • Centrum Wiskunde en Informatica (CWI), Amsterdam, The Netherlands


According to our database1, Marc Stevens authored at least 32 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Towards a Modern LLL Implementation.
IACR Cryptol. ePrint Arch., 2025

2024
Quantum Procedures for Nested Search Problems: with Applications in Cryptanalysis.
IACR Commun. Cryptol., 2024

Amortizing Circuit-PSI in the Multiple Sender/Receiver Setting.
IACR Commun. Cryptol., 2024

RADIUS/UDP Considered Harmful.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
Simplified Modeling of MITM Attacks for Block Ciphers: new (Quantum) Attacks.
IACR Cryptol. ePrint Arch., 2023

2022
A Quantum Analysis of Nested Search Problems with Applications in Cryptanalysis.
IACR Cryptol. ePrint Arch., 2022

Simplified MITM Modeling for Permutations: New (Quantum) Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Lattice Enumeration on GPUs for fplll.
IACR Cryptol. ePrint Arch., 2021

Advanced Lattice Sieving on GPUs, with Tensor Cores.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order Groups.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Non-interactive Cryptographic Timestamping Based on Verifiable Delay Functions.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
The General Sieve Kernel and New Records in Lattice Reduction.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2017
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds.
IACR Cryptol. ePrint Arch., 2017

Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions.
Proceedings of the 26th USENIX Security Symposium, 2017

M4GB: An Efficient Gröbner-Basis Algorithm.
Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation, 2017

The First Collision for Full SHA-1.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Deprecating an Internet Security Standard with Cryptanalysis.
ERCIM News, 2016

New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Freestart Collision for Full SHA-1.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

2015
Practical Free-Start Collision Attacks on 76-step SHA-1.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2013
New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis.
Proceedings of the Advances in Cryptology, 2013

Counter-Cryptanalysis.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Chosen-prefix collisions for MD5 and applications.
Int. J. Appl. Cryptogr., 2012

Single-block collision attack on MD5.
IACR Cryptol. ePrint Arch., 2012

Advances in Hash Function Cryptanalysis.
ERCIM News, 2012

2009
Breaking the Weakest Link: Becoming a Trusted Authority on the Internet.
ERCIM News, 2009

Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate.
Proceedings of the Advances in Cryptology, 2009

2007
Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities.
Proceedings of the Advances in Cryptology, 2007

2006
Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities.
IACR Cryptol. ePrint Arch., 2006

Fast Collision Attack on MD5.
IACR Cryptol. ePrint Arch., 2006

2004
Efficient Doubling on Genus Two Curves over Binary Fields.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004


  Loading...