McOE: A family of almost foolproof on-line authenticated encryption schemes E Fleischmann, C Forler, S Lucks Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012 | 136 | 2012 |
Catena: A memory-consuming password-scrambling framework C Forler, S Lucks, J Wenzel Cryptology ePrint Archive, 2013 | 73 | 2013 |
Pipelineable on-line encryption F Abed, S Fluhrer, C Forler, E List, S Lucks, D McGrew, J Wenzel International Workshop on Fast Software Encryption, 205-223, 2014 | 62 | 2014 |
General classification of the authenticated encryption schemes for the CAESAR competition F Abed, C Forler, S Lucks Computer Science Review 22, 13-26, 2016 | 50 | 2016 |
Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers. F Abed, C Forler, E List, S Lucks, J Wenzel IACR Cryptol. ePrint Arch. 2012, 591, 2012 | 34 | 2012 |
Memory-demanding password scrambling C Forler, S Lucks, J Wenzel Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 32 | 2014 |
Classification of the SHA-3 Candidates E Fleischmann, C Forler, M Gorski Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2009 | 31 | 2009 |
The POET family of on-line authenticated encryption schemes F Abed, S Fluhrer, J Foley, C Forler, E List, S Lucks, D McGrew, J Wenzel CAESAR submission, 2014 | 30* | 2014 |
General overview of the authenticated schemes for the first round of the caesar competition F Abed, C Forler, S Lucks IACR Cryptol ePrint Arch 2014, 792, 2014 | 27* | 2014 |
Overview of the Candidates for the Password Hashing Competition: And Their Resistance Against Garbage-Collector Attacks C Forler, E List, S Lucks, J Wenzel Technology and Practice of Passwords: International Conference on Passwords …, 2015 | 23 | 2015 |
Weimar-DM: a highly secure double-length compression function E Fleischmann, C Forler, S Lucks, J Wenzel Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012 | 23 | 2012 |
Biclique cryptanalysis of PRESENT, LED, and KLEIN F Abed, C Forler, E List, S Lucks, J Wenzel Cryptology ePrint Archive, 2012 | 21 | 2012 |
RIV for robust authenticated encryption F Abed, C Forler, E List, S Lucks, J Wenzel Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum …, 2016 | 20 | 2016 |
General overview of the first-round CAESAR candidates for authenticated encryption F Abed, C Forler, S Lucks IACR Cryptol. ePrint, Tech. Rep 792, 2014, 2014 | 19 | 2014 |
A framework for automated independent-biclique cryptanalysis F Abed, C Forler, E List, S Lucks, J Wenzel Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014 | 16 | 2014 |
New boomerang attacks on ARIA E Fleischmann, C Forler, M Gorski, S Lucks Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010 | 16 | 2010 |
Reforgeability of authenticated encryption schemes C Forler, E List, S Lucks, J Wenzel Australasian Conference on Information Security and Privacy, 19-37, 2017 | 15 | 2017 |
The Collision Security of MDC-4 E Fleischmann, C Forler, S Lucks Progress in Cryptology-AFRICACRYPT 2012: 5th International Conference on …, 2012 | 15 | 2012 |
Designing the API for a cryptographic library: A misuse-resistant application programming interface C Forler, S Lucks, J Wenzel Reliable Software Technologies–Ada-Europe 2012: 17th Ada-Europe …, 2012 | 14 | 2012 |
Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch C Forler, E List, S Lucks, J Wenzel Australasian Conference on Information Security and Privacy, 317-332, 2016 | 13 | 2016 |