Search results for: John Steinberger
Journal of Cryptology > 2018 > 31 > 4 > 1064-1119
Lecture Notes in Computer Science > Advances in Cryptology – EUROCRYPT 2010 > Hash and MAC > 573-596
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2011 > Hash Function > 233-251
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2011 > Symmetric Schemes > 561-577
Lecture Notes in Computer Science > Advances in Cryptology - CRYPTO 2009 > Modes of Operation > 267-285
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2008 > Hash Functions II > 433-450
Lecture Notes in Computer Science > Advances in Cryptology – EUROCRYPT 2010 > Hash and MAC > 597-615
Lecture Notes in Computer Science > Advances in Cryptology – EUROCRYPT 2011 > Symmetric Key Cryptography > 323-342
Journal of Cryptology > 2017 > 30 > 2 > 495-518
2013 IEEE Conference on Computational Complexity > 248 - 254
IEEE Transactions on Information Theory > 2012 > 58 > 9 > 6165 - 6182