Follow
John Steinberger
John Steinberger
Verified email at tsinghua.edu.cn - Homepage
Title
Cited by
Cited by
Year
Tight security bounds for key-alternating ciphers
S Chen, J Steinberger
Annual International Conference on the Theory and Applications of …, 2014
3162014
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations
A Bogdanov, LR Knudsen, G Leander, FX Standaert, J Steinberger, ...
Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012
1432012
Minimizing the two-round Even–Mansour cipher
S Chen, R Lampe, J Lee, Y Seurin, J Steinberger
Journal of Cryptology 31, 1064-1119, 2018
1322018
Constructing cryptographic hash functions from fixed-key blockciphers
P Rogaway, J Steinberger
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
1022008
On the indifferentiability of key-alternating ciphers
E Andreeva, A Bogdanov, Y Dodis, B Mennink, JP Steinberger
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
952013
Random oracles and non-uniformity
S Coretti, Y Dodis, S Guo, J Steinberger
Annual International Conference on the Theory and Applications of …, 2018
902018
Security/efficiency tradeoffs for permutation-based hashing
P Rogaway, J Steinberger
Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008
872008
The collision intractability of MDC-2 in the ideal-cipher model
JP Steinberger
Advances in Cryptology-EUROCRYPT 2007: 26th Annual International Conference …, 2007
802007
To Hash or Not to Hash Again?(In) Differentiability Results for and HMAC
Y Dodis, T Ristenpart, J Steinberger, S Tessaro
Annual Cryptology Conference, 348-366, 2012
742012
Indifferentiability of 8-round Feistel networks
Y Dai, J Steinberger
Annual International Cryptology Conference, 95-120, 2016
582016
The preimage security of double-block-length compression functions
F Armknecht, E Fleischmann, M Krause, J Lee, M Stam, J Steinberger
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
582011
Improved security bounds for key-alternating ciphers via hellinger distance
J Steinberger
Cryptology ePrint Archive, 2012
572012
Indifferentiability of confusion-diffusion networks
Y Dodis, M Stam, J Steinberger, T Liu
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
562016
The collision security of Tandem-DM in the ideal cipher model
J Lee, M Stam, J Steinberger
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
542011
Message authentication codes from unpredictable block ciphers
Y Dodis, J Steinberger
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009
472009
Minimal vanishing sums of roots of unity with large coefficients
JP Steinberger
Proceedings of the London Mathematical Society 97 (3), 689-717, 2008
402008
Domain extension for MACs beyond the birthday barrier
Y Dodis, J Steinberger
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
392011
Provable security of (tweakable) block ciphers based on substitution-permutation networks
B Cogliati, Y Dodis, J Katz, J Lee, J Steinberger, A Thiruvengadam, ...
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
362018
Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: five rounds are necessary and sufficient
Y Dai, Y Seurin, J Steinberger, A Thiruvengadam
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
282017
The security of multiple encryption in the ideal cipher model
Y Dai, J Lee, B Mennink, J Steinberger
Annual Cryptology Conference, 20-38, 2014
272014
The system can't perform the operation now. Try again later.
Articles 1–20