Differential and linear cryptanalysis using mixed-integer linear programming N Mouha, Q Wang, D Gu, B Preneel Information Security and Cryptology: 7th International Conference, Inscrypt …, 2012 | 402 | 2012 |
Report on lightweight cryptography K McKay, L Bassham, M Sönmez Turan, N Mouha National Institute of Standards and Technology, 2016 | 327 | 2016 |
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers N Mouha, B Mennink, A Van Herrewege, D Watanabe, B Preneel, ... Selected Areas in Cryptography, 2014 | 250 | 2014 |
SP 800-67 Rev. 2, Recommendation for Triple Data Encryption Algorithm (TDEA) Block Cipher E Barker, N Mouha NIST Special Publication 800-67 Rev. 2, 2017 | 224* | 2017 |
Towards finding optimal differential characteristics for ARX: Application to Salsa20 N Mouha, B Preneel Cryptology ePrint Archive, 2013 | 151* | 2013 |
How to Securely Release Unverified Plaintext in Authenticated Encryption. E Andreeva, A Bogdanov, A Luykx, B Mennink, N Mouha, K Yasuda IACR Cryptology ePrint Archive 2014, 30, 2014 | 138 | 2014 |
Meet-in-the-middle attacks on reduced-round XTEA G Sekar, N Mouha, V Velichkov, B Preneel Topics in Cryptology–CT-RSA 2011: The Cryptographers’ Track at the RSA …, 2011 | 94 | 2011 |
APE: authenticated permutation-based encryption for lightweight cryptography E Andreeva, B Bilgin, A Bogdanov, A Luykx, B Mennink, N Mouha, ... Fast Software Encryption: 21st International Workshop, FSE 2014, London, UK …, 2015 | 84 | 2015 |
Multi-key security: The Even-Mansour construction revisited N Mouha, A Luykx Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 77 | 2015 |
PRIMATEs E Andreeva, B Bilgin, A Bogdanov, A Luykx, F Mendel, B Mennink, ... DIAC 2015-Directions in Authenticated Ciphers, 2015 | 75* | 2015 |
Finding optimal bitsliced implementations of 4× 4-bit S-boxes M Ullrich, C De Canniere, S Indesteege, Ö Küçük, N Mouha, B Preneel SKEW 2011 Symmetric Key Encryption Workshop, Copenhagen, Denmark, 16-17, 2011 | 64 | 2011 |
Simpira v2: A family of efficient permutations using the AES round function S Gueron, N Mouha Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 62 | 2016 |
The differential analysis of S-functions N Mouha, V Velichkov, C De Canniere, B Preneel Selected Areas in Cryptography: 17th International Workshop, SAC 2010 …, 2011 | 59 | 2011 |
Finding bugs in cryptographic hash function implementations N Mouha, MS Raunak, DR Kuhn, R Kacker IEEE transactions on reliability 67 (3), 870-884, 2018 | 46 | 2018 |
The design space of lightweight cryptography N Mouha Cryptology ePrint Archive, 2015 | 44 | 2015 |
Full disk encryption: bridging theory and practice L Khati, N Mouha, D Vergnaud Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017 | 30 | 2017 |
Report on lightweight cryptography (nistir8114) K McKay, L Bassham, MS Turan, N Mouha National Institute of Standards and Technology (NIST), 2017 | 22 | 2017 |
Chaskey: a MAC Algorithm for Microcontrollers--Status Update and Proposal of Chaskey-12-- N Mouha Cryptology ePrint Archive, 2015 | 22 | 2015 |
The additive differential probability of ARX V Velichkov, N Mouha, C De Canniere, B Preneel Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby …, 2011 | 20 | 2011 |
Algebraic Techniques in Differential Cryptanalysis Revisited. M Wang, Y Sun, N Mouha, B Preneel ACISP 11, 120-141, 2011 | 19 | 2011 |