Ivica Nikolić
Ivica Nikolić
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Finding the greedy, prodigal, and suicidal contracts at scale
I Nikolić, A Kolluri, I Sergey, P Saxena, A Hobor
Proceedings of the 34th annual computer security applications conference …, 2018
Distinguisher and related-key attack on the full AES-256
A Biryukov, D Khovratovich, I Nikolić
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
J Jean, I Nikolić, T Peyrin
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
Rotational cryptanalysis of ARX
D Khovratovich, I Nikolić
Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul …, 2010
Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to AES, Camellia, Khazad and others
A Biryukov, I Nikolić
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
Ohie: Blockchain scaling made simple
H Yu, I Nikolić, R Hou, P Saxena
2020 IEEE Symposium on Security and Privacy (SP), 90-105, 2020
Deoxys v1. CAESAR submission
J Jean, I Nikolic, T Peyrin
Invariant subspace attack against Midori64 and the resistance criteria for S-box designs
J Guo, J Jean, I Nikolić, K Qiao, Y Sasaki, SM Sim
Cryptology ePrint Archive, 2016
Exploiting the laws of order in smart contracts
A Kolluri, I Nikolic, I Sergey, A Hobor, P Saxena
Proceedings of the 28th ACM SIGSOFT international symposium on software …, 2019
Rotational rebound attacks on reduced Skein
D Khovratovich, I Nikolić, C Rechberger
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
Rebound Attack on the Full Lane Compression Function
K Matusiewicz, M Naya-Plasencia, I Nikolić, Y Sasaki, M Schläffer
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
Security analysis of PRINCE
J Jean, I Nikolić, T Peyrin, L Wang, S Wu
Fast Software Encryption, 92-111, 2013
Cryptanalysis of Round-Reduced\ mathtt {LED}
I Nikolić, L Wang, S Wu
Fast Software Encryption, 112-129, 2013
Joltik v1. CAESAR submission
J Jean, I Nikolic, T Peyrin
Second-order differential collisions for reduced SHA-256
A Biryukov, M Lamberger, F Mendel, I Nikolić
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
Boomerang attacks on BLAKE-32
A Biryukov, I Nikolic, A Roy
Fast Software Encryption-18th International Workshop, 218-237, 2011
Collisions for step-reduced SHA-256
I Nikolić, A Biryukov
Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008
Meet-in-the-middle attacks on generic Feistel constructions
J Guo, J Jean, I Nikolić, Y Sasaki
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition
AD Dwivedi, M Klouček, P Morawiecki, I Nikolic, J Pieprzyk, S Wöjtowicz
Cryptology ePrint Archive, 2016
Refinements of the k-tree Algorithm for the Generalized Birthday Problem
I Nikolić, Y Sasaki
Advances in Cryptology–ASIACRYPT 2015, 683-703, 2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20