Tight security bounds for key-alternating ciphers S Chen, J Steinberger Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014 | 244 | 2014 |
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations A Bogdanov, LR Knudsen, G Leander, FX Standaert, J Steinberger, ... Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012 | 125 | 2012 |
Minimizing the two-round Even–Mansour cipher S Chen, R Lampe, J Lee, Y Seurin, J Steinberger Journal of Cryptology 31, 1064-1119, 2018 | 105 | 2018 |
Constructing cryptographic hash functions from fixed-key blockciphers P Rogaway, J Steinberger Lecture Notes in Computer Science 5157, 433-450, 2008 | 96 | 2008 |
Security/efficiency tradeoffs for permutation-based hashing P Rogaway, J Steinberger Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008 | 83 | 2008 |
On the indifferentiability of key-alternating ciphers E Andreeva, A Bogdanov, Y Dodis, B Mennink, JP Steinberger Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 79 | 2013 |
The collision intractability of MDC-2 in the ideal-cipher model JP Steinberger Advances in Cryptology-EUROCRYPT 2007: 26th Annual International Conference …, 2007 | 78 | 2007 |
To Hash or Not to Hash Again? (In)Differentiability Results for and HMAC Y Dodis, T Ristenpart, J Steinberger, S Tessaro Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012 | 66 | 2012 |
Random oracles and non-uniformity S Coretti, Y Dodis, S Guo, J Steinberger Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018 | 58 | 2018 |
Improved security bounds for key-alternating ciphers via hellinger distance J Steinberger Cryptology ePrint Archive, 2012 | 57 | 2012 |
The collision security of Tandem-DM in the ideal cipher model J Lee, M Stam, J Steinberger Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011 | 52 | 2011 |
The preimage security of double-block-length compression functions F Armknecht, E Fleischmann, M Krause, J Lee, M Stam, J Steinberger Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 47 | 2011 |
Indifferentiability of 8-round Feistel networks Y Dai, J Steinberger Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016 | 46 | 2016 |
Message authentication codes from unpredictable block ciphers Y Dodis, J Steinberger Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009 | 42 | 2009 |
Indifferentiability of confusion-diffusion networks Y Dodis, M Stam, J Steinberger, T Liu Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 39 | 2016 |
Domain extension for MACs beyond the birthday barrier Y Dodis, J Steinberger Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011 | 37 | 2011 |
Minimal vanishing sums of roots of unity with large coefficients JP Steinberger Proceedings of the London Mathematical Society 97 (3), 689-717, 2008 | 33 | 2008 |
Provable security of (tweakable) block ciphers based on substitution-permutation networks B Cogliati, Y Dodis, J Katz, J Lee, J Steinberger, A Thiruvengadam, ... Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 25 | 2018 |
Pseudorandom functions in almost constant depth from low-noise LPN Y Yu, J Steinberger Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 22 | 2016 |
The security of multiple encryption in the ideal cipher model Y Dai, J Lee, B Mennink, J Steinberger Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014 | 22 | 2014 |