Nicky Mouha
Orcid: 0000-0001-8861-782X
According to our database1,
Nicky Mouha
authored at least 38 papers
between 2009 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithm.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023
A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms.
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
Revisiting the Extension of Matsui's Algorithm 1 to Linear Hulls: Application to TinyJAMBU.
IACR Trans. Symmetric Cryptol., 2022
An overview of the Eight International Olympiad in Cryptography "Non-Stop University CRYPTO".
CoRR, 2022
2021
IACR Trans. Symmetric Cryptol., 2021
IACR Cryptol. ePrint Arch., 2021
The Seventh International Olympiad in Cryptography NSUCRYPTO: problems and solutions.
CoRR, 2021
The Application of Formal Methods to Real-World Cryptographic Algorithms, Protocols, and Systems.
Computer, 2021
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021
2020
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Chaskey: a MAC Algorithm for Microcontrollers - Status Update and Proposal of Chaskey-12 -.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
2012
Automated Techniques for Hash Function and Block Cipher Cryptanalysis (Automatische technieken voor hashfunctie- en blokcijfercryptanalyse).
PhD thesis, 2012
Challenging the increased resistance of regular hash functions against birthday attacks.
J. Math. Cryptol., 2012
UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
2011
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009