Author of the publication

Catena Variants - Different Instantiations for an Extremely Flexible Password-Hashing Framework.

, and . PASSWORDS, volume 9551 of Lecture Notes in Computer Science, page 95-119. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Stefan Schubert University of Stuttgart

Experimental and Numerical Data for: "Micro-PIV study on the influence of viscosity on the dynamics of droplet impact onto a thin film", and . Dataset, (2024)Related to: Schubert, S., Steigerwald, J., Geppert, A.K. et al. Micro-PIV study on the influence of viscosity on the dynamics of droplet impact onto a thin film. Exp Fluids 65, 69 (2024). doi: 10.1007/s00348-024-03800-5.
 

Other publications of authors with the same name

Stand der Faktorisierungsforschung., , and . Datenschutz und Datensicherheit, (2000)TWISTERpi - a framework for secure and fast hash functions., , , and . IJACT, 2 (1): 68-81 (2010)BEAST: A Fast Block Cipher for Arbitrary Blocksizes.. Communications and Multimedia Security, volume 70 of IFIP Conference Proceedings, page 144-153. Chapman & Hall, (1996)Authenticated Query Flooding in Sensor Networks., , , , and . SEC, volume 201 of IFIP, page 38-49. Springer, (2006)How to Make DES-based Smartcards fit for the 21-st Century., and . CARDIS, volume 180 of IFIP Conference Proceedings, page 93-114. Kluwer, (2000)Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers., , , , and . IACR Cryptology ePrint Archive, (2012)Catena: A Memory-Consuming Password Scrambler., , and . IACR Cryptology ePrint Archive, (2013)COFFE: Ciphertext Output Feedback Faithful Encryption., , , and . IACR Cryptology ePrint Archive, (2014)Insecurity of RCB: Leakage-Resilient Authenticated Encryption., , and . IACR Cryptology ePrint Archive, (2016)Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher., , and . ISPEC, volume 5451 of Lecture Notes in Computer Science, page 298-309. Springer, (2009)