Showing results 1 to 7 of 7
Minimizing the two-round Even-Mansour cipher Chen, Shan; Lampe, Rodolphe; Lee, Jooyoung; Seurin, Yannick; Steinberger, John, 34rd Annual International Cryptology Conference, CRYPTO 2014, pp.39 - 56, International Association for Cryptologic Research (IACR), 2014-08-17 |
Multi-property-preserving domain extension using polynomial-based modes of operation Lee, Jooyoung; Steinberger, John, 29th in the Series of EuropeanConferences on the Theory and Application of Cryptographic Techniques, Eurocrypt 2010, pp.573 - 596, International Association for Cryptologic Research (IACR), 2010-05-30 |
Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks Cogliati, Benoit; Dodis, Yevgeniy; Katz, Jonathan; Lee, Jooyoung; Steinberger, John; Thiruvengadam, Aishwarya; Zhang, Zhe, 38th Annual International Cryptology Conference (CRYPTO) 2018, pp.722 - 753, International Association for Cryptologic Research (IACR), 2018-08-22 |
Relaxing full-codebook security: A refined analysis of key-length extension schemes Gaži, Peter; Seurin, Yannick; Lee, Jooyoung; Steinberger, John; Tessaro, Stefano, 22nd International Workshop on Fast Software Encryption, FSE 2015, pp.319 - 341, Springer Verlag, 2015-03-08 |
The collision security of tandem-DM in the ideal cipher model Lee, Jooyoung; Stam, Martijn; Steinberger, John, 31st Annual International Cryptology Conference, CRYPTO 2011, pp.561 - 577, International Association for Cryptologic Research (IACR), 2011-08-14 |
The preimage security of double-block-length compression functions Armknecht, Frederik; Fleischmann, Ewan; Krause, Matthias; Lee, Jooyoung; Stam, Martijn; Steinberger, John, 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, pp.233 - 251, IACR, 2011-12-04 |
The security of multiple encryption in the ideal cipher model Dai, Yuanxi; Lee, Jooyoung; Mennink, Bart; Steinberger, John, 34rd Annual International Cryptology Conference, CRYPTO 2014, pp.20 - 38, International Association for Cryptologic Research (IACR), 2014-08-17 |
Discover