List, Eik
40  results:
Search for persons X
?
1

Diving Deep into the Preimage Security of AES-Like Hashing:

, In: Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2024,
Chen, Shiyao ; Guo, Jian ; List, Eik.. - p. 398-426 , 2024
 
?
2

Context-Committing Security of Leveled Leakage-Resilient AE..:

Dhar, Chandranan ; Ethan, Jordan ; Jejurikar, Ravindra...
IACR Transactions on Symmetric Cryptology.  2024 (2024)  2 - p. 348-370 , 2024
 
?
4

On the Security of Triplex- and Multiplex-Type Construction..:

, In: Lecture Notes in Computer Science; Progress in Cryptology – INDOCRYPT 2023,
Datta, Nilanjan ; Dutta, Avijit ; List, Eik. - p. 25-47 , 2024
 
?
5

Implicit Key-Stretching Security of Encryption Schemes:

, In: Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022,
Bossert, Jannis ; List, Eik ; Lucks, Stefan - p. 17-40 , 2023
 
?
6

PAE: Towards More Efficient and BBB-Secure AE from a Single..:

, In: Information and Communications Security; Lecture Notes in Computer Science,
 
?
7

Pholkos – Efficient Large-State Tweakable Block Ciphers fro..:

, In: Topics in Cryptology – CT-RSA 2022; Lecture Notes in Computer Science,
Bossert, Jannis ; List, Eik ; Lucks, Stefan. - p. 511-536 , 2022
 
?
8

$$\mathsf {CENCPP}^*$$: beyond-birthday-secure encryption f..:

Bhattacharjee, Arghya ; Dutta, Avijit ; List, Eik.
Designs, Codes and Cryptography.  90 (2022)  6 - p. 1381-1425 , 2022
 
?
9

TEDT2 – Highly Secure Leakage-Resilient TBC-Based Authentic..:

, In: Progress in Cryptology – LATINCRYPT 2021; Lecture Notes in Computer Science,
List, Eik - p. 275-295 , 2021
 
?
12

Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT):

, In: Advances in Cryptology – ASIACRYPT 2020; Lecture Notes in Computer Science,
Guo, Chun ; Guo, Jian ; List, Eik. - p. 567-597 , 2020
 
?
14

SecuriCast : zero-touch two-factor authentication using ..:

, In: Proceedings of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems,
 
?
15

Parallelizable MACs Based on the Sum of PRPs with Security ..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
Moch, Alexander ; List, Eik - p. 131-151 , 2019
 
1-15