Author of the publication

Mars Attacks! Revisited: - Differential Attack on 12 Rounds of the MARS Core and Defeating the Complex MARS Key-Schedule.

, , , , and . INDOCRYPT, volume 7107 of Lecture Notes in Computer Science, page 94-113. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name List, Eik
add a person with the name List, Eik
 

Other publications of authors with the same name

Critical Graphs for Minimum Vertex Cover., , , and . CoRR, (2017)RIV for Robust Authenticated Encryption., , , , and . FSE, volume 9783 of Lecture Notes in Computer Science, page 23-42. Springer, (2016)ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-Block-Cipher Calls., , and . ASIACRYPT (1), volume 11272 of Lecture Notes in Computer Science, page 336-366. Springer, (2018)Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption., and . CT-RSA, volume 10159 of Lecture Notes in Computer Science, page 258-274. Springer, (2017)On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis., , and . IACR Cryptology ePrint Archive, (2012)Pholkos - Efficient Large-State Tweakable Block Ciphers from the AES Round Function., , , and . CT-RSA, volume 13161 of Lecture Notes in Computer Science, page 511-536. Springer, (2022)XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing., , , , and . LATINCRYPT, volume 11368 of Lecture Notes in Computer Science, page 207-227. Springer, (2017)Reforgeability of Authenticated Encryption Schemes., , , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 19-37. Springer, (2017)Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers., , , , and . IACR Cryptology ePrint Archive, (2012)A Framework for Automated Independent-Biclique Cryptanalysis., , , , and . FSE, volume 8424 of Lecture Notes in Computer Science, page 561-581. Springer, (2013)