Tight security bounds for key-alternating ciphers S Chen, J Steinberger Annual International Conference on the Theory and Applications of …, 2014 | 307 | 2014 |
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations A Bogdanov, LR Knudsen, G Leander, FX Standaert, J Steinberger, ... Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012 | 142 | 2012 |
Minimizing the two-round Even–Mansour cipher S Chen, R Lampe, J Lee, Y Seurin, J Steinberger Journal of Cryptology 31, 1064-1119, 2018 | 131 | 2018 |
Constructing cryptographic hash functions from fixed-key blockciphers P Rogaway, J Steinberger Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008 | 100 | 2008 |
On the indifferentiability of key-alternating ciphers E Andreeva, A Bogdanov, Y Dodis, B Mennink, JP Steinberger Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 94 | 2013 |
Security/efficiency tradeoffs for permutation-based hashing P Rogaway, J Steinberger Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008 | 87 | 2008 |
Random oracles and non-uniformity S Coretti, Y Dodis, S Guo, J Steinberger Annual International Conference on the Theory and Applications of …, 2018 | 85 | 2018 |
The collision intractability of MDC-2 in the ideal-cipher model JP Steinberger Advances in Cryptology-EUROCRYPT 2007: 26th Annual International Conference …, 2007 | 79 | 2007 |
To Hash or Not to Hash Again?(In) Differentiability Results for and HMAC Y Dodis, T Ristenpart, J Steinberger, S Tessaro Annual Cryptology Conference, 348-366, 2012 | 74 | 2012 |
The preimage security of double-block-length compression functions F Armknecht, E Fleischmann, M Krause, J Lee, M Stam, J Steinberger Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 58 | 2011 |
Improved security bounds for key-alternating ciphers via hellinger distance J Steinberger Cryptology ePrint Archive, 2012 | 57 | 2012 |
Indifferentiability of 8-round Feistel networks Y Dai, J Steinberger Annual International Cryptology Conference, 95-120, 2016 | 56 | 2016 |
Indifferentiability of confusion-diffusion networks Y Dodis, M Stam, J Steinberger, T Liu Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 54 | 2016 |
The collision security of Tandem-DM in the ideal cipher model J Lee, M Stam, J Steinberger Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011 | 54 | 2011 |
Message authentication codes from unpredictable block ciphers Y Dodis, J Steinberger Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009 | 47 | 2009 |
Domain extension for MACs beyond the birthday barrier Y Dodis, J Steinberger Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011 | 39 | 2011 |
Minimal vanishing sums of roots of unity with large coefficients JP Steinberger Proceedings of the London Mathematical Society 97 (3), 689-717, 2008 | 39 | 2008 |
Provable security of (tweakable) block ciphers based on substitution-permutation networks B Cogliati, Y Dodis, J Katz, J Lee, J Steinberger, A Thiruvengadam, ... Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 34 | 2018 |
Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: five rounds are necessary and sufficient Y Dai, Y Seurin, J Steinberger, A Thiruvengadam Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017 | 27 | 2017 |
Pseudorandom functions in almost constant depth from low-noise LPN Y Yu, J Steinberger Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 26 | 2016 |