Sebastiaan Indesteege

According to our database1, Sebastiaan Indesteege authored at least 18 papers between 2007 and 2012.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
A Practical Attack on KeeLoq.
J. Cryptol., 2012

DES Collisions Revisited.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Tiger.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Keeloq.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Practical Collisions for EnRUPT.
J. Cryptol., 2011

2009
Coding Theory and Hash Function Design - A Case Study: The Lane Hash Function.
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009

Cryptanalysis of Dynamic SHA(2).
IACR Cryptol. ePrint Arch., 2009

Finding Collisions for a 45-Step Simplified HAS-V.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Practical Collisions for SHAMATA-256.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

Practical Preimages for Maraca.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

The Lane hash function.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

2008
Collisions and other Non-Random Properties for Step-Reduced SHA-256.
IACR Cryptol. ePrint Arch., 2008

Collisions for RC4-Hash.
Proceedings of the Information Security, 11th International Conference, 2008

A Differential-Linear Attack on 12-Round Serpent.
Proceedings of the Progress in Cryptology, 2008

A Practical Attack on KeeLoq.
Proceedings of the Advances in Cryptology, 2008

2007
Preimages for Reduced-Round Tiger.
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007


  Loading...