Online authenticated-encryption and its nonce-reuse misuse-resistance VT Hoang, R Reyhanitabar, P Rogaway, D Vizár Annual Cryptology Conference, 493-517, 2015 | 77 | 2015 |
Security of full-state keyed sponge and duplex: applications to authenticated encryption B Mennink, R Reyhanitabar, D Vizár Advances in Cryptology - ASIACRYPT 2015 9453, 465-489, 2014 | 73 | 2014 |
Forkcipher: a new primitive for authenticated encryption of very short messages E Andreeva, V Lallemand, A Purnal, R Reyhanitabar, A Roy, D Vizár International Conference on the Theory and Application of Cryptology and …, 2019 | 33 | 2019 |
CENC is optimally secure T Iwata, B Mennink, D Vizár Cryptology ePrint Archive, 2016 | 29 | 2016 |
Cryptanalysis of chosen symmetric homomorphic schemes D Vizár, S Vaudenay Studia Scientiarum Mathematicarum Hungarica 52 (2), 288-306, 2015 | 26 | 2015 |
OMD: A compression function mode of operation for authenticated encryption S Cogliani, DŞ Maimuţ, D Naccache, RP Canto, R Reyhanitabar, ... International Conference on Selected Areas in Cryptography, 112-128, 2014 | 24 | 2014 |
ForkAE v E Andreeva, V Lallemand, A Purnal, R Reyhanitabar, A Roy, D Vizár Submission to NIST lightweight cryptography project, 2019 | 22 | 2019 |
Boosting OMD for almost free authentication of associated data R Reyhanitabar, S Vaudenay, D Vizár International Workshop on Fast Software Encryption, 411-427, 2015 | 21 | 2015 |
Misuse-resistant variants of the OMD authenticated encryption mode R Reyhanitabar, S Vaudenay, D Vizár International Conference on Provable Security, 55-70, 2014 | 20 | 2014 |
Forking a blockcipher for authenticated encryption of very short messages E Andreeva, R Reyhanitabar, K Varici, D Vizár Cryptology ePrint Archive, 2018 | 17 | 2018 |
Authenticated encryption with variable stretch R Reyhanitabar, S Vaudenay, D Vizár International Conference on the Theory and Application of Cryptology and …, 2016 | 16 | 2016 |
Under pressure: Security of caesar candidates beyond their guarantees S Vaudenay, D Vizár Cryptology ePrint Archive, 2017 | 15 | 2017 |
Can Caesar Beat Galois? S Vaudenay, D Vizár International Conference on Applied Cryptography and Network Security, 476-494, 2018 | 9 | 2018 |
What the fork: implementation aspects of a forkcipher A Purnal, E Andreeva, A Roy, D Vizár NIST Lightweight Cryptography Workshop, 2019 | 8 | 2019 |
Analysis of chosen symmetric homomorphic schemes D Vizár, S Vaudenay Central European Crypto Conference, Budapest, Hungary, 2014 | 8 | 2014 |
Offset Merkle-Damgĺrd (OMD) version 2.0 S Cogliani, DS Maimut, D Naccache, RP do Canto, R Reyhanitabar, ... Submission to the CAESAR competition, 2015 | 6 | 2015 |
Offset Merkle-Damgĺrd (OMD), A CAESAR Proposal S Cogliani, DŞ Maimuţ, D Naccache, RP do Canto, R Reyhanitabar, ... | 5 | 2014 |
Nonce-Misuse Security of the SAEF Authenticated Encryption mode E Andreeva, AS Bhati, D Vizár International Conference on Selected Areas in Cryptography, 512-534, 2020 | 4 | 2020 |
Linking online misuse-resistant authenticated encryption and blockwise attack models G Endignoux, D Vizár Cryptology ePrint Archive, 2017 | 4 | 2017 |
Cryptanalysis of enhanced more DVS Vaudenay Tatra Mt. Math. Publ 73, 163-178, 2019 | 3 | 2019 |