Folgen
Jakob Wenzel
Jakob Wenzel
Bestätigte E-Mail-Adresse bei uni-weimar.de
Titel
Zitiert von
Zitiert von
Jahr
Differential Cryptanalysis of Round-Reduced Simon and Speck
F Abed, E List, S Lucks, J Wenzel
Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015
1712015
McOE: A family of almost foolproof on-line authenticated encryption schemes
E Fleischmann, C Forler, S Lucks
Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012
1362012
Differential and linear cryptanalysis of reduced-round SIMON
F Abed, E List, S Lucks, J Wenzel
Cryptology ePrint Archive, 2013
752013
Differential and linear cryptanalysis of reduced-round SIMON
F Abed, E List, S Lucks, J Wenzel
Cryptology ePrint Archive, 2013
752013
Catena: A memory-consuming password-scrambling framework
C Forler, S Lucks, J Wenzel
Cryptology ePrint Archive, 2013
722013
Pipelineable on-line encryption
F Abed, S Fluhrer, C Forler, E List, S Lucks, D McGrew, J Wenzel
International Workshop on Fast Software Encryption, 205-223, 2014
582014
Cryptanalysis of the speck family of block ciphers
F Abed, E List, S Lucks, J Wenzel
Cryptology ePrint Archive, 2013
402013
Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers.
F Abed, C Forler, E List, S Lucks, J Wenzel
IACR Cryptol. ePrint Arch. 2012, 591, 2012
342012
Memory-demanding password scrambling
C Forler, S Lucks, J Wenzel
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
322014
Overview of the Candidates for the Password Hashing Competition: And Their Resistance Against Garbage-Collector Attacks
C Forler, E List, S Lucks, J Wenzel
Technology and Practice of Passwords: International Conference on Passwords …, 2015
232015
The POET family of on-line authenticated encryption schemes
F Abed, S Fluhrer, J Foley, C Forler, E List, S Lucks, D McGrew, J Wenzel
CAESAR submission, 2014
232014
Weimar-DM: a highly secure double-length compression function
E Fleischmann, C Forler, S Lucks, J Wenzel
Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012
232012
Biclique cryptanalysis of PRESENT, LED, and KLEIN
F Abed, C Forler, E List, S Lucks, J Wenzel
Cryptology ePrint Archive, 2012
202012
Biclique cryptanalysis of PRESENT, LED, and KLEIN
F Abed, C Forler, E List, S Lucks, J Wenzel
Cryptology ePrint Archive, 2012
202012
RIV for robust authenticated encryption
F Abed, C Forler, E List, S Lucks, J Wenzel
Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum …, 2016
192016
A framework for automated independent-biclique cryptanalysis
F Abed, C Forler, E List, S Lucks, J Wenzel
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
162014
Reforgeability of authenticated encryption schemes
C Forler, E List, S Lucks, J Wenzel
Australasian Conference on Information Security and Privacy, 19-37, 2017
152017
Designing the API for a cryptographic library: A misuse-resistant application programming interface
C Forler, S Lucks, J Wenzel
Reliable Software Technologies–Ada-Europe 2012: 17th Ada-Europe …, 2012
142012
Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch
C Forler, E List, S Lucks, J Wenzel
Australasian Conference on Information Security and Privacy, 317-332, 2016
132016
Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions
F Abed, C Forler, E List, S Lucks, J Wenzel
Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014
92014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20