Elmar Tischhauser
Elmar Tischhauser
Verified email at mathematik.uni-marburg.de - Homepage
Title
Cited by
Cited by
Year
When intrusion detection meets blockchain technology: a review
W Meng, EW Tischhauser, Q Wang, Y Wang, J Han
Ieee Access 6, 10179-10188, 2018
3242018
ALE: AES-based lightweight authenticated encryption
A Bogdanov, F Mendel, F Regazzoni, V Rijmen, E Tischhauser
International Workshop on Fast Software Encryption, 447-466, 2013
1372013
Parallelizable and authenticated online ciphers
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda
International Conference on the Theory and Application of Cryptology and …, 2013
1312013
Key-alternating ciphers in a provable setting: Encryption using a small number of public permutations
A Bogdanov, LR Knudsen, G Leander, FX Standaert, J Steinberger, ...
Annual international conference on the theory and applications of …, 2012
1082012
A MAC mode for lightweight block ciphers
A Luykx, B Preneel, E Tischhauser, K Yasuda
International Conference on Fast Software Encryption, 43-59, 2016
562016
On the wrong key randomisation and key equivalence hypotheses in Matsui’s Algorithm 2
A Bogdanov, E Tischhauser
International Workshop on Fast Software Encryption, 19-38, 2013
542013
Fast and memory-efficient key recovery in side-channel attacks
A Bogdanov, I Kizhvatov, K Manzoor, E Tischhauser, M Witteman
International Conference on Selected Areas in Cryptography, 310-327, 2015
522015
Whirlwind: a new cryptographic hash function
P Barreto, V Nikov, S Nikova, V Rijmen, E Tischhauser
Designs, codes and cryptography 56 (2-3), 141-162, 2010
442010
Towards practical whitebox cryptography: optimizing efficiency and space hardness
A Bogdanov, T Isobe, E Tischhauser
International Conference on the Theory and Application of Cryptology and …, 2016
422016
The LANE hash function
S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ...
Dagstuhl Seminar Proceedings, 2009
382009
A model for structure attacks, with applications to PRESENT and Serpent
M Wang, Y Sun, E Tischhauser, B Preneel
International Workshop on Fast Software Encryption, 49-68, 2012
312012
COLM v1
E Andreeva, A Bogdanov, N Datta, A Luykx, B Mennink, M Nandi, ...
Submission to the CAESAR Competition, 2016
282016
Sundae: Small universal deterministic authenticated encryption for the internet of things
S Banik, A Bogdanov, A Luykx, E Tischhauser
IACR Transactions on Symmetric Cryptology, 1-35, 2018
272018
AES-Based Authenticated Encryption Modes in Parallel High-Performance Software.
A Bogdanov, MM Lauridsen, E Tischhauser
IACR Cryptol. ePrint Arch. 2014, 186, 2014
242014
AES-COPA v.
E Andreeva, A Bogdanov, A Luykx, B Mennink, E Tischhauser, K Yasuda
232015
Twisted polynomials and forgery attacks on GCM
MA Abdelraheem, P Beelen, A Bogdanov, E Tischhauser
Annual International Conference on the Theory and Applications of …, 2015
222015
Improved collision attacks on the reduced-round Grøstl hash function
K Ideguchi, E Tischhauser, B Preneel
International Conference on Information Security, 1-16, 2010
202010
Comb to pipeline: Fast software encryption revisited
A Bogdanov, MM Lauridsen, E Tischhauser
International Workshop on Fast Software Encryption, 150-171, 2015
162015
Multivariate Linear Cryptanalysis: The Past and Future of PRESENT.
A Bogdanov, E Tischhauser, PS Vejre
IACR Cryptol. ePrint Arch. 2016, 667, 2016
142016
The LANE hash function. Submission to NIST (2008)
S Indesteege, E Andreeva, C De Canniere, O Dunkelman, E Käsper, ...
14
The system can't perform the operation now. Try again later.
Articles 1–20