Follow
Nicky Mouha
Nicky Mouha
Researcher, NIST
Verified email at nist.gov
Title
Cited by
Cited by
Year
Differential and linear cryptanalysis using mixed-integer linear programming
N Mouha, Q Wang, D Gu, B Preneel
Information Security and Cryptology: 7th International Conference, Inscrypt …, 2012
4022012
Report on lightweight cryptography
K McKay, L Bassham, M Sönmez Turan, N Mouha
National Institute of Standards and Technology, 2016
3272016
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers
N Mouha, B Mennink, A Van Herrewege, D Watanabe, B Preneel, ...
Selected Areas in Cryptography, 2014
2502014
SP 800-67 Rev. 2, Recommendation for Triple Data Encryption Algorithm (TDEA) Block Cipher
E Barker, N Mouha
NIST Special Publication 800-67 Rev. 2, 2017
224*2017
Towards finding optimal differential characteristics for ARX: Application to Salsa20
N Mouha, B Preneel
Cryptology ePrint Archive, 2013
151*2013
How to Securely Release Unverified Plaintext in Authenticated Encryption.
E Andreeva, A Bogdanov, A Luykx, B Mennink, N Mouha, K Yasuda
IACR Cryptology ePrint Archive 2014, 30, 2014
1382014
Meet-in-the-middle attacks on reduced-round XTEA
G Sekar, N Mouha, V Velichkov, B Preneel
Topics in Cryptology–CT-RSA 2011: The Cryptographers’ Track at the RSA …, 2011
942011
APE: authenticated permutation-based encryption for lightweight cryptography
E Andreeva, B Bilgin, A Bogdanov, A Luykx, B Mennink, N Mouha, ...
Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015
842015
Multi-key security: The Even-Mansour construction revisited
N Mouha, A Luykx
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
772015
PRIMATEs
E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ...
DIAC 2015-Directions in Authenticated Ciphers, 2015
75*2015
Finding optimal bitsliced implementations of 4× 4-bit S-boxes
M Ullrich, C De Canniere, S Indesteege, Ö Küçük, N Mouha, B Preneel
SKEW 2011 Symmetric Key Encryption Workshop, Copenhagen, Denmark, 16-17, 2011
642011
Simpira v2: A family of efficient permutations using the AES round function
S Gueron, N Mouha
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
622016
The differential analysis of S-functions
N Mouha, V Velichkov, C De Canniere, B Preneel
Selected Areas in Cryptography: 17th International Workshop, SAC 2010 …, 2011
592011
Finding bugs in cryptographic hash function implementations
N Mouha, MS Raunak, DR Kuhn, R Kacker
IEEE transactions on reliability 67 (3), 870-884, 2018
462018
The design space of lightweight cryptography
N Mouha
Cryptology ePrint Archive, 2015
442015
Full disk encryption: bridging theory and practice
L Khati, N Mouha, D Vergnaud
Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017
302017
Report on lightweight cryptography (nistir8114)
K McKay, L Bassham, MS Turan, N Mouha
National Institute of Standards and Technology (NIST), 2017
222017
Chaskey: a MAC Algorithm for Microcontrollers--Status Update and Proposal of Chaskey-12--
N Mouha
Cryptology ePrint Archive, 2015
222015
The additive differential probability of ARX
V Velichkov, N Mouha, C De Canniere, B Preneel
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby …, 2011
202011
Algebraic Techniques in Differential Cryptanalysis Revisited.
M Wang, Y Sun, N Mouha, B Preneel
ACISP 11, 120-141, 2011
192011
The system can't perform the operation now. Try again later.
Articles 1–20