Volgen
Christian Forler
Christian Forler
Berliner Hochschule für Technik
Geverifieerd e-mailadres voor beuth-hochschule.de - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
McOE: A family of almost foolproof on-line authenticated encryption schemes
E Fleischmann, C Forler, S Lucks
Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012
1362012
Catena: A memory-consuming password-scrambling framework
C Forler, S Lucks, J Wenzel
Cryptology ePrint Archive, 2013
722013
Pipelineable on-line encryption
F Abed, S Fluhrer, C Forler, E List, S Lucks, D McGrew, J Wenzel
International Workshop on Fast Software Encryption, 205-223, 2014
622014
General classification of the authenticated encryption schemes for the CAESAR competition
F Abed, C Forler, S Lucks
Computer Science Review 22, 13-26, 2016
492016
Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers.
F Abed, C Forler, E List, S Lucks, J Wenzel
IACR Cryptol. ePrint Arch. 2012, 591, 2012
342012
Memory-demanding password scrambling
C Forler, S Lucks, J Wenzel
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
322014
Classification of the SHA-3 Candidates
E Fleischmann, C Forler, M Gorski
Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2009
312009
The POET family of on-line authenticated encryption schemes
F Abed, S Fluhrer, J Foley, C Forler, E List, S Lucks, D McGrew, J Wenzel
CAESAR submission, 2014
30*2014
General overview of the authenticated schemes for the first round of the caesar competition
F Abed, C Forler, S Lucks
IACR Cryptol ePrint Arch 2014, 792, 2014
27*2014
Overview of the Candidates for the Password Hashing Competition: And Their Resistance Against Garbage-Collector Attacks
C Forler, E List, S Lucks, J Wenzel
Technology and Practice of Passwords: International Conference on Passwords …, 2015
232015
Weimar-DM: a highly secure double-length compression function
E Fleischmann, C Forler, S Lucks, J Wenzel
Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012
232012
RIV for robust authenticated encryption
F Abed, C Forler, E List, S Lucks, J Wenzel
Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum …, 2016
202016
Biclique cryptanalysis of PRESENT, LED, and KLEIN
F Abed, C Forler, E List, S Lucks, J Wenzel
Cryptology ePrint Archive, 2012
202012
General overview of the first-round CAESAR candidates for authenticated encryption
F Abed, C Forler, S Lucks
IACR Cryptol. ePrint, Tech. Rep 792, 2014, 2014
192014
A framework for automated independent-biclique cryptanalysis
F Abed, C Forler, E List, S Lucks, J Wenzel
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
162014
New boomerang attacks on ARIA
E Fleischmann, C Forler, M Gorski, S Lucks
Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010
162010
Reforgeability of authenticated encryption schemes
C Forler, E List, S Lucks, J Wenzel
Australasian Conference on Information Security and Privacy, 19-37, 2017
152017
The Collision Security of MDC-4
E Fleischmann, C Forler, S Lucks
Progress in Cryptology-AFRICACRYPT 2012: 5th International Conference on …, 2012
152012
Designing the API for a cryptographic library: A misuse-resistant application programming interface
C Forler, S Lucks, J Wenzel
Reliable Software Technologies–Ada-Europe 2012: 17th Ada-Europe …, 2012
142012
Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch
C Forler, E List, S Lucks, J Wenzel
Australasian Conference on Information Security and Privacy, 317-332, 2016
132016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20