![]() | 2009 | |
---|---|---|
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Ewan Fleischmann, Michael Gorski, Stefan Lucks: Attacking 9 and 10 Rounds of AES-256. ACISP 2009: 60-72 |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Antoine Joux, Stefan Lucks: Improved Generic Algorithms for 3-Collisions. ASIACRYPT 2009: 347-363 |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks, Andreas Schuler, Erik Tews, Ralf-Philipp Weinmann, Matthias Wenzel: Attacks on the DECT Authentication Mechanisms. CT-RSA 2009: 48-65 |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Ewan Fleischmann, Michael Gorski, Stefan Lucks: On the Security of Tandem-DM. FSE 2009: 84-103 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Ewan Fleischmann, Michael Gorski, Stefan Lucks: Security of Cyclic Double Block Length Hash Functions. IMA Int. Conf. 2009: 153-175 |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Orr Dunkelman, Ewan Fleischmann, Michael Gorski, Stefan Lucks: Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode. INDOCRYPT 2009: 157-168 |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks: Twister- A Framework for Secure and Fast Hash Functions. ISPEC 2009: 257-273 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Ewan Fleischmann, Michael Gorski, Stefan Lucks: Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher. ISPEC 2009: 298-309 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Ewan Fleischmann, Michael Gorski, Stefan Lucks: Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2. ISPEC 2009: 310-323 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Emin Islam Tatli, Stefan Lucks: Mobile Identity Management Revisited. Electr. Notes Theor. Comput. Sci. 244: 125-137 (2009) |
2008 | ||
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks, Ahmad-Reza Sadeghi, Christopher Wolf: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers Springer 2008 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gorski, Stefan Lucks, Thomas Peyrin: Slide Attacks on a Class of Hash Functions. ASIACRYPT 2008: 143-160 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff: Concrete Security for Entity Recognition: The Jane Doe Protocol. INDOCRYPT 2008: 158-171 |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gorski, Stefan Lucks: New Related-Key Boomerang Attacks on AES. INDOCRYPT 2008: 266-278 |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Sebastian Faust, Emilia Käsper, Stefan Lucks: Efficient Simultaneous Broadcast. Public Key Cryptography 2008: 180-196 |
2007 | ||
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: Symmetric Cryptography, 07.01. - 12.01.2007 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Abstracts Collection -- Symmetric Cryptography. Symmetric Cryptography 2007 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Executive Summary -- Symmetric Cryptography. Symmetric Cryptography 2007 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks: A Collision-Resistant Rate-1 Double-Block-Length Hash Function. Symmetric Cryptography 2007 |
2006 | ||
49 | ![]() ![]() ![]() ![]() ![]() ![]() | John Kelsey, Stefan Lucks: Collisions and Near-Collisions for Reduced-Round Tiger. FSE 2006: 111-125 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Zinaida Benenson, Lexi Pimenidis, Felix C. Freiling, Stefan Lucks: Authenticated Query Flooding in Sensor Networks. PerCom Workshops 2006: 644-647 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Zinaida Benenson, Felix C. Freiling, Ernest Hammerschmidt, Stefan Lucks, Lexi Pimenidis: Authenticated Query Flooding in Sensor Networks. SEC 2006: 38-49 |
2005 | ||
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Christopher Wolf, Stefan Lucks, Po-Wah Yau: WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium GI 2005 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks: A Failure-Friendly Design Principle for Hash Functions. ASIACRYPT 2005: 474-494 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Ulrich Kühn, Klaus Kursawe, Stefan Lucks, Ahmad-Reza Sadeghi, Christian Stüble: Secure Data Management in Trusted Computing. CHES 2005: 324-338 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Zinaida Benenson, Ulrich Kühn, Stefan Lucks: Cryptographic Attack Metrics. Dependability Metrics 2005: 133-156 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks: Two-Pass Authenticated Encryption Faster Than Generic Composition. FSE 2005: 284-298 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff: Entity Recognition for Sensor Network Motes. GI Jahrestagung (2) 2005: 145-149 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks, Nico Schmoigl, Emin Islam Tatli: Issues on Designing a Cryptographic Compiler. WEWoRC 2005: 109-122 |
2004 | ||
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Frederik Armknecht, Stefan Lucks: Linearity of the AES Key Schedule. AES Conference 2004: 159-169 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks: Ciphers Secure against Related-Key Attacks. FSE 2004: 359-370 |
2003 | ||
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno: Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. FSE 2003: 330-346 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks, Rüdiger Weis: How to turn a PIN into an Iron Beam. SEC 2003: 385-396 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Rüdiger Weis, Stefan Lucks, Andreas Bogk: Sicherheit von 1024 bit RSA-Schlüsseln gefährdet. Datenschutz und Datensicherheit 27(6): (2003) |
2002 | ||
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks: A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order. ASIACRYPT 2002: 27-45 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks, Rüdiger Weis: Neue Ergebnisse zur Sicherheit des Verschlüsselungsstandards AES. Datenschutz und Datensicherheit 26(12): (2002) |
2001 | ||
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Erik Zenner, Matthias Krause, Stefan Lucks: Improved Cryptanalysis of the Self-Shrinking Generator. ACISP 2001: 21-35 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks: The Saturation Attack - A Bait for Twofish. FSE 2001: 1-15 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Paul Crowley, Stefan Lucks: Bias in the LEVIATHAN Stream Cipher. FSE 2001: 211-218 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Matthias Krause, Stefan Lucks: On the Minimal Hardware Complexity of Pseudorandom Function Generators. STACS 2001: 419-430 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Scott R. Fluhrer, Stefan Lucks: Analysis of the E0 Encryption System. Selected Areas in Cryptography 2001: 38-48 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Matthias Krause, Stefan Lucks: Pseudorandom functions in TC0 and cryptographic limitations to proving lower bounds. Computational Complexity 10(4): 297-313 (2001) |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Rüdiger Weis, Stefan Lucks: Standardmäßige Wave-LAN Unsicherheit. Datenschutz und Datensicherheit 25(11): (2001) |
2000 | ||
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks: Attacking Seven Rounds of Rijndael under 192-bit and 256-bit Keys. AES Candidate Conference 2000: 215-229 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks, Rüdiger Weis: How to Make DES-based Smartcards fit for the 21-st Century. CARDIS 2000: 93-114 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks: The Sum of PRPs Is a Secure PRF. EUROCRYPT 2000: 470-484 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Michael Stay, David Wagner, Doug Whiting: Improved Cryptanalysis of Rijndael. FSE 2000: 213-230 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Rüdiger Weis, Jürgen Vogel, Wolfgang Effelsberg, Werner Geyer, Stefan Lucks: How to Make a Digital Whiteboard Secure - Using Java-Cards for Multimedia Applications. IDMS 2000: 187-198 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Rüdiger Weis, Wolfgang Effelsberg, Stefan Lucks: Remotely Keyed Encryption with Java Cards: A Secure and Efficient Method to Encrypt Multimedia Streams. IEEE International Conference on Multimedia and Expo (I) 2000: 537-540 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Rüdiger Weis, Bastiaan Bakker, Stefan Lucks: Security on Your Hand: Secure Filesystems with a ``Non-Cryptographic'' JAVA-Ring. Java Card Workshop 2000: 151-162 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Rüdiger Weis, Wolfgang Effelsberg, Stefan Lucks: Combining Authentication and Light-Weight Payment for Active Networks. SMARTNET 2000: 453-470 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks, Rüdiger Weis: Der DES-Nachfolger Rijndael. Datenschutz und Datensicherheit 24(12): (2000) |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Rüdiger Weis, Stefan Lucks, Werner Geyer: Stand der Faktorisierungsforschung. Datenschutz und Datensicherheit 24(3): (2000) |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Rüdiger Weis, Stefan Lucks: Die dritte AES-Konferenz in New York - Vor der Entscheidung über den DES Nachfolger. Datenschutz und Datensicherheit 24(7): (2000) |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Erik Zenner, Rüdiger Weis, Stefan Lucks: Sicherheit des GSM- Verschlüsselungsstandards A5. Datenschutz und Datensicherheit 24(7): (2000) |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Matthias Krause, Stefan Lucks: On Learning versus Distinguishing and the Minimal Hardware Complexity of Pseudorandom Function Generators Electronic Colloquium on Computational Complexity (ECCC) 7(14): (2000) |
1999 | ||
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Rüdiger Weis, Stefan Lucks: Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers. ECMAST 1999: 456-471 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks: Accelerated Remotely Keyed Encruption. FSE 1999: 112-123 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks: On Security of the 128-Bit Block Cipher DEAL. FSE 1999: 60-70 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Rüdiger Weis, Stefan Lucks: Advanced Encryption Standard - Verschlüsselungsstandard für das einundzwanzigste Jahrhundert. Datenschutz und Datensicherheit 23(9): (1999) |
1998 | ||
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Rüdiger Weis, Stefan Lucks: The Performance of Modern Block Ciphers in Java. CARDIS 1998: 125-133 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks: Attacking Triple Encryption. FSE 1998: 239-253 |
1997 | ||
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks: On the Security of Remotely Keyed Encryption. FSE 1997: 219-229 |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks: Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys. Security Protocols Workshop 1997: 79-90 |
1996 | ||
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks: BEAST: A Fast Block Cipher for Arbitrary Blocksizes. Communications and Multimedia Security 1996: 144-153 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks: Faster Luby-Rackoff Ciphers. FSE 1996: 189-203 |
1995 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks: How Traveling Salespersons Prove Their Identity. IMA Conf. 1995: 142-149 |
1994 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefan Lucks: How to Exploit the Intractability of Exact TSP for Cryptography. FSE 1994: 298-304 |