Nicky Mouha

According to our database1, Nicky Mouha authored at least 33 papers between 2009 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Finding Bugs in Cryptographic Hash Function Implementations.
IEEE Trans. Reliability, 2018

Psst, Can You Keep a Secret?
IEEE Computer, 2018

2017
Finding Bugs in Cryptographic Hash Function Implementations.
IACR Cryptology ePrint Archive, 2017

SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security.
IACR Cryptology ePrint Archive, 2017

The Iterated Random Function Problem.
IACR Cryptology ePrint Archive, 2017

Full Disk Encryption: Bridging Theory and Practice.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

The Iterated Random Function Problem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Full Disk Encryption: Bridging Theory and Practice.
IACR Cryptology ePrint Archive, 2016

Simpira v2: A Family of Efficient Permutations Using the AES Round Function.
IACR Cryptology ePrint Archive, 2016

Simpira v2: A Family of Efficient Permutations Using the AES Round Function.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Multi-Key Security: The Even-Mansour Construction Revisited.
IACR Cryptology ePrint Archive, 2015

Chaskey: a MAC Algorithm for Microcontrollers - Status Update and Proposal of Chaskey-12 -.
IACR Cryptology ePrint Archive, 2015

The Design Space of Lightweight Cryptography.
IACR Cryptology ePrint Archive, 2015

More Rounds, Less Security?
IACR Cryptology ePrint Archive, 2015

Multi-key Security: The Even-Mansour Construction Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers.
IACR Cryptology ePrint Archive, 2014

How to Securely Release Unverified Plaintext in Authenticated Encryption.
IACR Cryptology ePrint Archive, 2014

Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

How to Securely Release Unverified Plaintext in Authenticated Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
A Proof that the ARX Cipher Salsa20 is Secure against Differential Cryptanalysis.
IACR Cryptology ePrint Archive, 2013

APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
IACR Cryptology ePrint Archive, 2013

2012
Automated Techniques for Hash Function and Block Cipher Cryptanalysis (Automatische technieken voor hashfunctie- en blokcijfercryptanalyse).
PhD thesis, 2012

Challenging the increased resistance of regular hash functions against birthday attacks.
J. Mathematical Cryptology, 2012

UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

2011
MD4-MD5.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

The Additive Differential Probability of ARX.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

Meet-in-the-Middle Attacks on Reduced-Round XTEA.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Algebraic Techniques in Differential Cryptanalysis Revisited.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
The Differential Analysis of S-Functions.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

2009
Finding Collisions for a 45-Step Simplified HAS-V.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Cryptanalysis of the ESSENCE Family of Hash Functions.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009


  Loading...