Reza Reyhanitabar

According to our database1, Reza Reyhanitabar authored at least 24 papers between 2007 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Power Yoga: Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT.
IACR Trans. Symmetric Cryptol., 2021

2019
Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages.
IACR Cryptol. ePrint Arch., 2019

2018
Key Encapsulation from Noisy Key Agreement in the Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2018

Forking a Blockcipher for Authenticated Encryption of Very Short Messages.
IACR Cryptol. ePrint Arch., 2018

2016
Authenticated Encryption with Variable Stretch.
IACR Cryptol. ePrint Arch., 2016

2015
Boosting OMD for Almost Free Authentication of Associated Data.
IACR Cryptol. ePrint Arch., 2015

Security of Full-State Keyed and Duplex Sponge: Applications to Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2015

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance.
IACR Cryptol. ePrint Arch., 2015

Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Authenticated Encryption: Toward Next-Generation Algorithms.
IEEE Secur. Priv., 2014

OMD: A Compression Function Mode of Operation for Authenticated Encryption.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Misuse-Resistant Variants of the OMD Authenticated Encryption Mode.
Proceedings of the Provable Security - 8th International Conference, 2014

Breaking the IOC Authenticated Encryption Mode.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2012
Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles.
IACR Cryptol. ePrint Arch., 2012

Fault Analysis of the KATAN Family of Block Ciphers.
IACR Cryptol. ePrint Arch., 2012

On Capabilities of Hash Domain Extenders to Preserve Enhanced Security Properties.
Proceedings of the Provable Security - 6th International Conference, 2012

2011
Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships.
IACR Cryptol. ePrint Arch., 2010

On the Security of NOEKEON against Side Channel Cube Attacks.
Proceedings of the Information Security, 2010

2009
An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions.
IACR Cryptol. ePrint Arch., 2009

Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders.
IACR Cryptol. ePrint Arch., 2009

Enhanced Target Collision Resistant Hash Functions Revisited.
IACR Cryptol. ePrint Arch., 2009

2007
Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions.
IACR Cryptol. ePrint Arch., 2007

Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007


  Loading...