Tight security bounds for key-alternating ciphers S Chen, J Steinberger Annual International Conference on the Theory and Applications of …, 2014 | 181 | 2014 |
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations A Bogdanov, LR Knudsen, G Leander, FX Standaert, J Steinberger, ... Annual international conference on the theory and applications of …, 2012 | 103 | 2012 |
Minimizing the two-round Even–Mansour cipher S Chen, R Lampe, J Lee, Y Seurin, J Steinberger Journal of Cryptology 31 (4), 1064-1119, 2018 | 86 | 2018 |
Constructing cryptographic hash functions from fixed-key blockciphers P Rogaway, J Steinberger Annual International Cryptology Conference, 433-450, 2008 | 84 | 2008 |
Security/efficiency tradeoffs for permutation-based hashing P Rogaway, J Steinberger Annual International Conference on the Theory and Applications of …, 2008 | 78 | 2008 |
The collision intractability of MDC-2 in the ideal-cipher model JP Steinberger Annual International Conference on the Theory and Applications of …, 2007 | 77 | 2007 |
On the indifferentiability of key-alternating ciphers E Andreeva, A Bogdanov, Y Dodis, B Mennink, JP Steinberger Annual Cryptology Conference, 531-550, 2013 | 67 | 2013 |
To Hash or Not to Hash Again? (In)Differentiability Results for and HMAC Y Dodis, T Ristenpart, J Steinberger, S Tessaro Annual Cryptology Conference, 348-366, 2012 | 55 | 2012 |
Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance. JP Steinberger IACR Cryptol. ePrint Arch. 2012, 481, 2012 | 51 | 2012 |
The collision security of Tandem-DM in the ideal cipher model J Lee, M Stam, J Steinberger Annual Cryptology Conference, 561-577, 2011 | 49 | 2011 |
The preimage security of double-block-length compression functions F Armknecht, E Fleischmann, M Krause, J Lee, M Stam, J Steinberger International Conference on the Theory and Application of Cryptology and …, 2011 | 39 | 2011 |
Domain extension for MACs beyond the birthday barrier Y Dodis, J Steinberger Annual International Conference on the Theory and Applications of …, 2011 | 35 | 2011 |
Message authentication codes from unpredictable block ciphers Y Dodis, J Steinberger Annual International Cryptology Conference, 267-285, 2009 | 35 | 2009 |
Random oracles and non-uniformity S Coretti, Y Dodis, S Guo, J Steinberger Annual International Conference on the Theory and Applications of …, 2018 | 31 | 2018 |
Indifferentiability of 8-round feistel networks Y Dai, J Steinberger Annual International Cryptology Conference, 95-120, 2016 | 28 | 2016 |
Minimal vanishing sums of roots of unity with large coefficients JP Steinberger Proceedings of the London Mathematical Society 97 (3), 689-717, 2008 | 26 | 2008 |
Indifferentiability of confusion-diffusion networks Y Dodis, M Stam, J Steinberger, T Liu Annual International Conference on the Theory and Applications of …, 2016 | 23 | 2016 |
Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation J Lee, J Steinberger IEEE transactions on information theory 58 (9), 6165-6182, 2012 | 21 | 2012 |
Asiacrypt 2011. LNCS, vol. 7073 DH Lee, X Wang Springer, Heidelberg, 2011 | 21* | 2011 |
The security of multiple encryption in the ideal cipher model Y Dai, J Lee, B Mennink, J Steinberger Annual Cryptology Conference, 20-38, 2014 | 18 | 2014 |