Finding the greedy, prodigal, and suicidal contracts at scale I Nikolić, A Kolluri, I Sergey, P Saxena, A Hobor Proceedings of the 34th annual computer security applications conference …, 2018 | 497 | 2018 |
Distinguisher and related-key attack on the full AES-256 A Biryukov, D Khovratovich, I Nikolić Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009 | 412 | 2009 |
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework J Jean, I Nikolić, T Peyrin Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 243 | 2014 |
Rotational cryptanalysis of ARX D Khovratovich, I Nikolić Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul …, 2010 | 175 | 2010 |
Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to AES, Camellia, Khazad and others A Biryukov, I Nikolić Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010 | 153 | 2010 |
Ohie: Blockchain scaling made simple H Yu, I Nikolić, R Hou, P Saxena 2020 IEEE Symposium on Security and Privacy (SP), 90-105, 2020 | 115 | 2020 |
Deoxys v1. CAESAR submission J Jean, I Nikolic, T Peyrin | 113* | 2014 |
Invariant subspace attack against Midori64 and the resistance criteria for S-box designs J Guo, J Jean, I Nikolić, K Qiao, Y Sasaki, SM Sim Cryptology ePrint Archive, 2016 | 84* | 2016 |
Exploiting the laws of order in smart contracts A Kolluri, I Nikolic, I Sergey, A Hobor, P Saxena Proceedings of the 28th ACM SIGSOFT international symposium on software …, 2019 | 83 | 2019 |
Rotational rebound attacks on reduced Skein D Khovratovich, I Nikolić, C Rechberger Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010 | 82 | 2010 |
Rebound Attack on the Full Lane Compression Function K Matusiewicz, M Naya-Plasencia, I Nikolić, Y Sasaki, M Schläffer Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009 | 69 | 2009 |
Security analysis of PRINCE J Jean, I Nikolić, T Peyrin, L Wang, S Wu Fast Software Encryption, 92-111, 2013 | 67 | 2013 |
Cryptanalysis of Round-Reduced\ mathtt {LED} I Nikolić, L Wang, S Wu Fast Software Encryption, 112-129, 2013 | 66* | 2013 |
Joltik v1. CAESAR submission J Jean, I Nikolic, T Peyrin | 65* | 2014 |
Second-order differential collisions for reduced SHA-256 A Biryukov, M Lamberger, F Mendel, I Nikolić Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 59 | 2011 |
Boomerang attacks on BLAKE-32 A Biryukov, I Nikolic, A Roy Fast Software Encryption-18th International Workshop, 218-237, 2011 | 57 | 2011 |
Collisions for step-reduced SHA-256 I Nikolić, A Biryukov Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008 | 52 | 2008 |
Meet-in-the-middle attacks on generic Feistel constructions J Guo, J Jean, I Nikolić, Y Sasaki Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 49 | 2014 |
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition AD Dwivedi, M Klouček, P Morawiecki, I Nikolic, J Pieprzyk, S Wöjtowicz Cryptology ePrint Archive, 2016 | 44 | 2016 |
Refinements of the k-tree Algorithm for the Generalized Birthday Problem I Nikolić, Y Sasaki Advances in Cryptology–ASIACRYPT 2015, 683-703, 2015 | 44 | 2015 |