Follow
Eik List
Eik List
Chair of Media Security, Bauhaus-Universität Weimar
Verified email at uni-weimar.de
Title
Cited by
Cited by
Year
Differential cryptanalysis of round-reduced Simon and Speck
F Abed, E List, S Lucks, J Wenzel
International Workshop on Fast Software Encryption, 525-545, 2014
1472014
Differential and linear cryptanalysis of reduced-round SIMON
F Abed, E List, S Lucks, J Wenzel
Cryptology ePrint Archive, 2013
702013
Rasta: a cipher with low ANDdepth and few ANDs per bit
C Dobraunig, M Eichlseder, L Grassi, V Lallemand, G Leander, E List, ...
Annual International Cryptology Conference, 662-692, 2018
652018
Pipelineable on-line encryption
F Abed, S Fluhrer, C Forler, E List, S Lucks, D McGrew, J Wenzel
International Workshop on Fast Software Encryption, 205-223, 2014
622014
Related-Key Impossible-Differential Attack on Reduced-Round Skinny
R Ankele, S Banik, A Chakraborti, E List, F Mendel, SM Sim, G Wang
International Conference on Applied Cryptography and Network Security, 208-228, 2017
412017
Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers
F Abed, C Forler, E List, S Lucks, J Wenzel
IACR Cryptology ePrint Archive 2012, 591, 2012
39*2012
Cryptanalysis of the Speck Family of Block Ciphers
F Abed, E List, S Lucks, J Wenzel
IACR Cryptology ePrint Archive 2013, 568, 2013
342013
The POET Family of On-Line Authenticated Encryption Schemes
F Abed, S Fluhrer, J Foley, C Forler, E List, S Lucks, D McGrew, J Wenzel
CAESAR competition, 2014
31*2014
Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption
E List, M Nandi
Cryptographers’ Track at the RSA Conference, 258-274, 2017
282017
On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis
F Abed, E List, S Lucks
IACR Cryptology ePrint Archive 2012, 712, 2012
252012
A framework for automated independent-biclique cryptanalysis
F Abed, C Forler, E List, S Lucks, J Wenzel
International Workshop on Fast Software Encryption, 561-581, 2013
20*2013
ZMAC+–an efficient variable-output-length variant of ZMAC
E List, M Nandi
IACR Transactions on Symmetric Cryptology, 306-325, 2017
172017
Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC
C Dobraunig, E List
Cryptographers’ Track at the RSA Conference, 207-222, 2017
162017
Differential cryptanalysis of round-reduced sparx-64/128
R Ankele, E List
International Conference on Applied Cryptography and Network Security, 459-475, 2018
152018
Reforgeability of authenticated encryption schemes
C Forler, E List, S Lucks, J Wenzel
Australasian Conference on Information Security and Privacy, 19-37, 2017
152017
RIV for robust authenticated encryption
F Abed, C Forler, E List, S Lucks, J Wenzel
International Conference on Fast Software Encryption, 23-42, 2016
142016
Biclique cryptanalysis of present, led
F Abed, C Forler, E List, S Lucks, J Wenzel
and klein//Cryptology ePrint Archive: Report 2012/591–2012, 2012
132012
Biclique cryptanalysis of PRESENT, LED, and KLEIN
F Abed, C Forler, E List, S Lucks, J Wenzel
Cryptology ePrint Archive, 2012
122012
XHX–a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing
A Jha, E List, K Minematsu, S Mishra, M Nandi
International Conference on Cryptology and Information Security in Latin …, 2017
112017
Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch
C Forler, E List, S Lucks, J Wenzel
Australasian Conference on Information Security and Privacy, 317-332, 2016
112016
The system can't perform the operation now. Try again later.
Articles 1–20